{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:31Z","timestamp":1771699831276,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":52,"publisher":"Springer New York","isbn-type":[{"value":"9781461454151","type":"print"},{"value":"9781461454168","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4614-5416-8_2","type":"book-chapter","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T18:16:40Z","timestamp":1347905800000},"page":"15-39","source":"Crossref","is-referenced-by-count":11,"title":["Security Games Applied to Real-World: Research Contributions and Challenges"],"prefix":"10.1007","author":[{"given":"Manish","family":"Jain","sequence":"first","affiliation":[]},{"given":"Bo","family":"An","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,23]]},"reference":[{"key":"2_CR1","unstructured":"Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., Parachuri, P.: Deployed ARMOR protection: The Application of a Game-Theoretic Model for Security at the Los Angeles International Airport. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 125\u2013132"},{"key":"2_CR2","unstructured":"Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., Tambe, M.: IRIS: a Tool for Strategic Security Allocation in Transportation Networks. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 37\u201344"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., Marecki, J.: GUARDS and PROTECT: Next Generation Applications of Security Games. SIGECOM 10 (March 2011) 31\u201334","DOI":"10.1145\/1978721.1978729"},{"key":"2_CR4","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., Steigerwald, E.: GUARDS - Game Theoretic Security Allocation on a National Scale. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)","DOI":"10.1017\/CBO9780511973031.006"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.: TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems. In: Proc. of The 24th Conference on Innovative Applications of Artificial Intelligence (IAAI). (2012)","DOI":"10.1609\/aimag.v33i4.2432"},{"key":"2_CR7","unstructured":"von Stackelberg, H.: Marktform und Gleichgewicht. Springer, Vienna (1934)"},{"key":"2_CR8","unstructured":"Gatti, N.: Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form. In: ECAI-08. (2008) 403\u2013407"},{"issue":"1\u20132","key":"2_CR9","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s10207-004-0060-x","volume":"4","author":"K. Lye","year":"2005","unstructured":"Lye, K., Wing, J.M.: Game Strategies in Network Security. International Journal of Information Security 4(1\u20132) (2005) 71\u201386","journal-title":"International Journal of Information Security"},{"key":"2_CR10","unstructured":"Brown, G., Carlyle, M., Kline, J., Wood, K.: A Two-Sided Optimization for Theater Ballistic Missile Defense. In: Operations Research. Volume 53. (2005) 263\u2013275"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Sandler, T., M., D.G.A.: Terrorism and Game Theory. Simulation and Gaming 34(3) (2003) 319\u2013337","DOI":"10.1177\/1046878103255492"},{"key":"2_CR12","unstructured":"Avenhaus, R., von Stengel, B., Zamir, S.: Inspection Games. In Aumann, R.J., Hart, S., eds.: Handbook of Game Theory. Volume 3. North-Holland, Amsterdam (2002) 1947\u20131987"},{"key":"2_CR13","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing Games with Security: An Efficient Exact Algorithm for Bayesian Stackelberg Games. In: Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2008) 895\u2013902"},{"key":"2_CR14","unstructured":"Conitzer, V., Sandholm, T.: Computing the Optimal Strategy to Commit to. In: Proc. of the ACM Conference on Electronic Commerce (ACM-EC). (2006) 82\u201390"},{"key":"2_CR15","unstructured":"Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending Critical Infrastructure. In: Interfaces. Volume 36. (2006) 530 \u2013 544"},{"key":"2_CR16","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., Ordonez, F.: Computing Optimal Randomized Resource Allocations for Massive Security Games. In: Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2009) 689\u2013696"},{"key":"2_CR17","unstructured":"Jain, M., Kiekintveld, C., Tambe, M.: Quality-Bounded Solutions for Finite Bayesian Stackelberg Games: Scaling Up. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Leitmann, G.: On Generalized Stackelberg Strategies. Optimization Theory and Applications 26(4) (1978) 637\u2013643","DOI":"10.1007\/BF00933155"},{"issue":"1","key":"2_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/BF00939867","volume":"59","author":"M. Breton","year":"1988","unstructured":"Breton, M., Alg, A., Haurie, A.: Sequential stackelberg equilibria in two-person games. Optimization Theory and Applications 59(1) (1988) 71\u201397","journal-title":"Optimization Theory and Applications"},{"key":"2_CR20","unstructured":"von Stengel, B., Zamir, S.: Leadership with Commitment to Mixed Strategies. Technical Report LSE-CDAM-2004-01, CDAM Research Report (2004)"},{"key":"2_CR21","unstructured":"Osbourne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press (1994)"},{"key":"2_CR22","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1287\/inte.1100.0505","volume":"40","author":"M. Jain","year":"2010","unstructured":"Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ordonez, F.: Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service. Interfaces 40 (2010) 267\u2013290","journal-title":"Interfaces"},{"key":"2_CR23","unstructured":"Jain, M., Kardes, E., Kiekintveld, C., Ordonez, F., Tambe, M.: Security Games with Arbitrary Schedules: A Branch and Price Approach. In: Proc. of The 24th AAAI Conference on Artificial Intelligence. (2010) 792\u2013797"},{"issue":"1","key":"2_CR24","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1006\/game.1995.1023","volume":"10","author":"R.D. McKelvey","year":"1995","unstructured":"McKelvey, R.D., Palfrey, T.R.: Quantal Response Equilibria for Normal Form Games. Games and Economic Behavior 10(1) (1995) 6\u201338","journal-title":"Games and Economic Behavior"},{"key":"2_CR25","unstructured":"TSA: Layers of Security: What We Do. http:\/\/www.tsa.gov\/what_we_do\/layers\/index.shtm (2011)"},{"key":"2_CR26","unstructured":"TSA: Transportation Security Administration \u2014 U.S. Department of Homeland Security. http:\/\/www.tsa.gov\/ (2011)"},{"key":"2_CR27","unstructured":"Hamilton, B.A.: Faregating Analysis. Report Commissioned by the LA Metro. http:\/\/boardarchives.metro.net\/Items\/2007\/11_November\/20071115EMACItem27.pdf (2007)"},{"key":"2_CR28","unstructured":"Jiang, A.X., Yin, Z., Kietkintveld, C., Leyton-Brown, K., Sandholm, T., Tambe, M.: Towards Optimal Patrol Strategies for Urban Security in Transit Systems. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)"},{"key":"2_CR29","unstructured":"Chandran, R., Beitchman, G.: Battle for Mumbai Ends, Death Toll Rises to 195. Times of India (29 November 2008) http:\/\/articles.timesofindia.indiatimes.com\/2008-11-29\/india\/27930171_1_taj-hotel-three-terrorists-nariman-house ."},{"key":"2_CR30","unstructured":"Johnson, M., Fang, F., Yang, R., Tambe, M., Albers, H.: Patrolling to Maximize Pristine Forest Area. In: Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health. (2012)"},{"key":"2_CR31","unstructured":"Ordonez, F., Tambe, M., Jara, J.F., Jain, M., Kiekintveld, C., Tsai, J.: Deployed Security Games for Patrol Planning. In: Handbook on Operations Research for Homeland Security. (2008)"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Trusov, M., Bucklin, R.E., Pauwels, K.: Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site. Journal of Marketing 73 (2009)","DOI":"10.2139\/ssrn.1129351"},{"key":"2_CR33","unstructured":"Howard, N.J.: Finding Optimal Strategies for Influencing Social Networks in Two Player Games. Master\u2019s thesis, MIT, Sloan School of Management (2011)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Alpcan, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511760778"},{"key":"2_CR35","unstructured":"Vanek, O., Yin, Z., Jain, M., Bosansky, B., Tambe, M., Pechoucek, M.: Game-Theoretic Resource Allocation for Malicious Packet Detection in Computer Networks. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)"},{"key":"2_CR36","unstructured":"Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., Tambe, M.: A Double Oracle Algorithm for Zero-Sum SEcurity games on Graphs. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)"},{"key":"2_CR37","unstructured":"Keteyian, A.: TSA: Federal Air Marshals. (2010) http:\/\/www.cbsnews.com\/stories\/2010\/02\/01\/earlyshow\/main6162291.shtml , retrieved Feb 1, 2011."},{"key":"2_CR38","unstructured":"Bertsimas, D., Tsitsiklis, J.N.: Introduction to Linear Optimization. Athena Scientific (1994)"},{"key":"2_CR39","unstructured":"Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In: AAMAS. (2010) 1139\u20131146"},{"key":"2_CR40","unstructured":"Letchford, J., Conitzer, V., Munagala, K.: Learning and Approximating the Optimal Strategy to Commit To. In: Second International Symposium on Algorithmic Game Theory (SAGT). (2009) 250\u2013262"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Jain, M., Leyton-Brown, K., Tambe, M.: The Deployment-to-Saturation Ratio in Security Games. In: Proc. of The 26th AAAI Conference on Artificial Intelligence (AAAI). (2012)","DOI":"10.1609\/aaai.v26i1.8268"},{"issue":"15","key":"2_CR42","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1016\/j.artint.2010.07.002","volume":"174","author":"J. Pita","year":"2010","unstructured":"Pita, J., Jain, M., Tambe, M., Ord\u00f3\u00f1ez, F., Kraus, S.: Robust Solutions to Stackelberg Games: Addressing Bounded Rationality and Limited Observations in Human Cognition. Artificial Intelligence 174(15) (2010) 1142\u20131171","journal-title":"Artificial Intelligence"},{"key":"2_CR43","unstructured":"Cheeseman, P., Kanefsky, B., Taylor, W.M.: Where the Really Hard Problems are. In: Proceedings of the International Joint Conference on Artificial Intelligence. (1991) 331\u2013337"},{"key":"2_CR44","unstructured":"Mitchell, D., Selman, B., Levesque, H.: Hard and Easy Distributions of SAT Problems. In: Proceedings of the American Association for Artificial Intelligence. (1992) 459\u2013465"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Kiekintveld, C., Marecki, J., Tambe, M.: Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Uncertainty. In: Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2011)","DOI":"10.1017\/CBO9780511973031.011"},{"key":"2_CR46","unstructured":"Yin, Z., Jain, M., Tambe, M., Ordonez, F.: Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty. In: Proc. of The 25th AAAI Conference on Artificial Intelligence (AAAI). (2011) 758\u2013763"},{"key":"2_CR47","unstructured":"An, B., Tambe, M., Ordonez, F., Shieh, E., Kiekintveld, C.: Refinement of Strong Stackelberg Equilibria in Security Games. In: Proc. of the 25th Conference on Artificial Intelligence. (2011) 587\u2013593"},{"issue":"2","key":"2_CR48","doi-asserted-by":"crossref","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D. Kahneman","year":"1979","unstructured":"Kahneman, D., Tvesky, A.: Prospect Theory: An Analysis of Decision Under Risk. Econometrica 47(2) (1979) 263\u2013291","journal-title":"Econometrica"},{"key":"2_CR49","unstructured":"Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., John, R.: Improving Resource Allocation Strategy Against Human Adversaries in Security Games. In: IJCAI. (2011)"},{"key":"2_CR50","unstructured":"An, B., Jain, M., Tambe, M., Kiekintveld, C.: Mixed-Initiative Optimization in Security Games: A Preliminary Report. In: Proc. of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration. (2011) 8\u201311"},{"key":"2_CR51","unstructured":"Brown, M., An, B., Kiekintveld, C., Ordonez, F., Tambe, M.: Multi-objective optimization for security games. In: Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2012)"},{"key":"2_CR52","unstructured":"Taylor, M.E., Kiekintveld, C., Western, C., Tambe, M.: A Framework For Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? Informatica 34 (2010) 129\u2013139"}],"container-title":["Advances in Information Security","Moving Target Defense II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-5416-8_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T17:10:47Z","timestamp":1687713047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-5416-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,23]]},"ISBN":["9781461454151","9781461454168"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-5416-8_2","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2012,8,23]]}}}