{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:57:23Z","timestamp":1726055843881},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030324292"},{"type":"electronic","value":"9783030324308"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32430-8_23","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T11:11:01Z","timestamp":1572001861000},"page":"385-403","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates"],"prefix":"10.1007","author":[{"given":"Bhaskar","family":"Ramasubramanian","sequence":"first","affiliation":[]},{"given":"Luyao","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Bushnell","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"issue":"11","key":"23_CR1","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1016\/j.automatica.2008.03.027","volume":"44","author":"A Abate","year":"2008","unstructured":"Abate, A., Prandini, M., Lygeros, J., Sastry, S.: Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems. Automatica 44(11), 2724\u20132734 (2008)","journal-title":"Automatica"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadi, M., Jansen, N., Wu, B., Topcu, U.: Control theory meets POMDPs: A hybrid systems approach. arXiv preprint arXiv:1905.08095 (2019)","DOI":"10.1109\/TAC.2020.3035755"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Ahmadi, M., Wu, B., Lin, H., Topcu, U.: Privacy verification in POMDPs via barrier certificates. In: IEEE Conference on Decision and Control, pp. 5610\u20135615 (2018)","DOI":"10.1109\/CDC.2018.8619061"},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1145\/227595.227602","volume":"43","author":"R Alur","year":"1996","unstructured":"Alur, R., Feder, T., Henzinger, T.A.: The benefits of relaxing punctuality. J. ACM 43(1), 116\u2013146 (1996)","journal-title":"J. ACM"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Ames, A.D., Coogan, S., Egerstedt, M., Notomista, G., Sreenath, K., Tabuada, P.: Control barrier functions: Theory and applications. In: European Control Conference, pp. 3420\u20133431 (2019)","DOI":"10.23919\/ECC.2019.8796030"},{"issue":"8","key":"23_CR6","doi-asserted-by":"publisher","first-page":"3861","DOI":"10.1109\/TAC.2016.2638961","volume":"62","author":"AD Ames","year":"2016","unstructured":"Ames, A.D., Xu, X., Grizzle, J.W., Tabuada, P.: Control barrier function based quadratic programs for safety critical systems. IEEE Trans. Autom. Control 62(8), 3861\u20133876 (2016)","journal-title":"IEEE Trans. Autom. Control"},{"key":"23_CR7","volume-title":"Dynamic Noncooperative Game Theory","author":"T Ba\u015far","year":"1999","unstructured":"Ba\u015far, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 23. SIAM, Philadelphia (1999)"},{"issue":"1","key":"23_CR8","first-page":"161","volume":"12","author":"R Baheti","year":"2011","unstructured":"Baheti, R., Gill, H.: Cyber-physical systems. Impact Control Technol. 12(1), 161\u2013166 (2011)","journal-title":"Impact Control Technol."},{"key":"23_CR9","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"23_CR10","series-title":"Studies in Systems, Decision and Control","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50763-7","volume-title":"Formal Methods for Discrete-Time Dynamical Systems","author":"C Belta","year":"2017","unstructured":"Belta, C., Yordanov, B., Aydin Gol, E.: Formal Methods for Discrete-Time Dynamical Systems. SSDC, vol. 89. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50763-7"},{"key":"23_CR11","volume-title":"Dynamic Programming and Optimal Control, Volumes I and II","author":"DP Bertsekas","year":"2015","unstructured":"Bertsekas, D.P.: Dynamic Programming and Optimal Control, Volumes I and II, 4th edn. Athena Scientific, Nashua (2015)","edition":"4"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-319-63121-9_11","volume-title":"Models, Algorithms, Logics and Tools","author":"P Bouyer","year":"2017","unstructured":"Bouyer, P., Laroussinie, F., Markey, N., Ouaknine, J., Worrell, J.: Timed temporal logics. In: Aceto, L., Bacci, G., Bacci, G., Ing\u00f3lfsd\u00f3ttir, A., Legay, A., Mardare, R. (eds.) Models, Algorithms, Logics and Tools. LNCS, vol. 10460, pp. 211\u2013230. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63121-9_11"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BF00939867","volume":"59","author":"M Breton","year":"1988","unstructured":"Breton, M., Alj, A., Haurie, A.: Sequential Stackelberg equilibria in two-person games. J. Optim. Theory Appl. 59(1), 71\u201397 (1988)","journal-title":"J. Optim. Theory Appl."},{"issue":"8","key":"23_CR14","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/9.133184","volume":"36","author":"CS Chow","year":"1991","unstructured":"Chow, C.S., Tsitsiklis, J.N.: An optimal one-way multigrid algorithm for discrete-time stochastic control. IEEE Trans. Autom. Control 36(8), 898\u2013914 (1991)","journal-title":"IEEE Trans. Autom. Control"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-48683-6_44","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"1999","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NuSMV: A new symbolic model verifier. In: Halbwachs, N., Peled, D. (eds.) CAV 1999. LNCS, vol. 1633, pp. 495\u2013499. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48683-6_44"},{"key":"23_CR16","first-page":"1558","volume":"15","author":"G Giacomo De","year":"2015","unstructured":"De Giacomo, G., Vardi, M.: Synthesis for LTL and LDL on finite traces. Int. Joint Conf. Artif. Intell. 15, 1558\u20131564 (2015)","journal-title":"Int. Joint Conf. Artif. Intell."},{"key":"23_CR17","unstructured":"De Giacomo, G., Vardi, M.Y.: Linear temporal logic and linear dynamic logic on finite traces. In: International Joint Conference on Artificial Intelligence, pp. 854\u2013860 (2013)"},{"issue":"9","key":"23_CR18","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1016\/j.automatica.2013.05.025","volume":"49","author":"J Ding","year":"2013","unstructured":"Ding, J., Kamgarpour, M., Summers, S., Abate, A., Lygeros, J., Tomlin, C.: A stochastic games framework for verification and control of discrete time stochastic hybrid systems. Automatica 49(9), 2665\u20132674 (2013)","journal-title":"Automatica"},{"issue":"5","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1109\/TAC.2014.2298143","volume":"59","author":"X Ding","year":"2014","unstructured":"Ding, X., Smith, S.L., Belta, C., Rus, D.: Optimal control of MDPs with linear temporal logic constraints. IEEE Trans. Autom. Control 59(5), 1244\u20131257 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"23_CR20","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53(1), 23\u201340 (2011)","journal-title":"Survival"},{"key":"23_CR21","unstructured":"Gordon, G.J.: Approximate solutions to Markov decision processes. School of Computer Science, Carnegie-Mellon University, Pittsburgh, PA, Technical report (1999)"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-030-01090-4_11","volume-title":"Automated Technology for Verification and Analysis","author":"P Jagtap","year":"2018","unstructured":"Jagtap, P., Soudjani, S., Zamani, M.: Temporal logic verification of stochastic systems using barrier certificates. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 177\u2013193. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_11"},{"key":"23_CR23","unstructured":"Jagtap, P., Soudjani, S., Zamani, M.: Formal synthesis of stochastic systems via control barrier certificates. arXiv preprint arXiv:1905.04585 (2019)"},{"issue":"1","key":"23_CR24","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/LCSYS.2018.2853698","volume":"3","author":"S Kolathaya","year":"2018","unstructured":"Kolathaya, S., Ames, A.D.: Input-to-state safety with control barrier functions. Control Syst. Lett. 3(1), 108\u2013113 (2018)","journal-title":"Control Syst. Lett."},{"key":"23_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/978-3-319-96145-3_30","volume-title":"Computer Aided Verification","author":"J K\u0159et\u00ednsk\u00fd","year":"2018","unstructured":"K\u0159et\u00ednsk\u00fd, J., Meggendorfer, T., Sickert, S., Ziegler, C.: Rabinizer 4: From LTL to your favourite deterministic automaton. In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10981, pp. 567\u2013577. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96145-3_30"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/3-540-48683-6_17","volume-title":"Computer Aided Verification","author":"O Kupferman","year":"1999","unstructured":"Kupferman, O., Vardi, M.Y.: Model checking of safety properties. In: Halbwachs, N., Peled, D. (eds.) CAV 1999. LNCS, vol. 1633, pp. 172\u2013183. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48683-6_17"},{"key":"23_CR27","volume-title":"Stochastic Stability and Control","author":"HJ Kushner","year":"1967","unstructured":"Kushner, H.J.: Stochastic Stability and Control. Academic Press, Cambridge (1967)"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: Verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"issue":"3","key":"23_CR29","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1006\/jsco.2001.0472","volume":"32","author":"G Lafferriere","year":"2001","unstructured":"Lafferriere, G., Pappas, G.J., Yovine, S.: Symbolic reachability computation for families of linear vector fields. J. Symb. Comput. 32(3), 231\u2013253 (2001)","journal-title":"J. Symb. Comput."},{"issue":"1","key":"23_CR30","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/LCSYS.2018.2853182","volume":"3","author":"L Lindemann","year":"2019","unstructured":"Lindemann, L., Dimarogonas, D.V.: Control barrier functions for signal temporal logic tasks. IEEE Control Syst. Lett. 3(1), 96\u2013101 (2019)","journal-title":"IEEE Control Syst. Lett."},{"key":"23_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-30206-3_12","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"O Maler","year":"2004","unstructured":"Maler, O., Nickovic, D.: Monitoring temporal properties of continuous signals. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS\/FTRTFT -2004. LNCS, vol. 3253, pp. 152\u2013166. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12"},{"key":"23_CR32","unstructured":"Niu, L., Clark, A.: Secure control under LTL constraints. In: IEEE American Control Conference, pp. 3544\u20133551 (2018)"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Niu, L., Li, Z., Clark, A.: LQG reference tracking with safety and reachability guarantees under false data injection attacks. In: IEEE American Control Conference, pp. 2950\u20132957 (2019)","DOI":"10.23919\/ACC.2019.8814821"},{"issue":"2","key":"23_CR34","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10107-003-0387-5","volume":"96","author":"PA Parrilo","year":"2003","unstructured":"Parrilo, P.A.: Semidefinite programming relaxations for semialgebraic problems. Math. Programm. 96(2), 293\u2013320 (2003)","journal-title":"Math. Programm."},{"issue":"7","key":"23_CR35","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/TAC.2017.2760515","volume":"63","author":"G Pola","year":"2017","unstructured":"Pola, G., Manes, C., van der Schaft, A.J., Di Benedetto, M.D.: Bisimulation equivalence of discrete-time stochastic linear control systems. IEEE Trans. Autom. Control 63(7), 1897\u20131912 (2017)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"8","key":"23_CR36","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1109\/TAC.2007.902736","volume":"52","author":"S Prajna","year":"2007","unstructured":"Prajna, S., Jadbabaie, A., Pappas, G.J.: A framework for worst-case and stochastic safety verification using barrier certificates. Trans. Autom. Control 52(8), 1415\u20131428 (2007)","journal-title":"Trans. Autom. Control"},{"key":"23_CR37","unstructured":"Prajna, S., Papachristodoulou, A., Parrilo, P.A.: Introducing SOSTOOLS: A general purpose sum of squares programming solver. In: IEEE Conference on Decision and Control, vol. 1, pp. 741\u2013746 (2002)"},{"key":"23_CR38","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"ML Puterman","year":"2014","unstructured":"Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, Hoboken (2014)"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Ramasubramanian, B., Clark, A., Bushnell, L., Poovendran, R.: Secure control under partial observability under temporal logic constraints. In: IEEE American Control Conference, pp. 1181\u20131188 (2019)","DOI":"10.23919\/ACC.2019.8814630"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Saha, I., Ramaithitima, R., Kumar, V., Pappas, G.J., Seshia, S.A.: Automated composition of motion primitives for multi-robot systems from safe LTL specifications. In: Proceedings of International Conference on Intelligent Robots and Systems, pp. 1525\u20131532 (2014)","DOI":"10.1109\/IROS.2014.6942758"},{"key":"23_CR41","doi-asserted-by":"crossref","unstructured":"Santoyo, C., Dutreix, M., Coogan, S.: Verification and control for finite-time safety of stochastic systems via barrier functions. In: IEEE Conference on Control Technology and Applications (2019)","DOI":"10.1109\/CCTA.2019.8920407"},{"key":"23_CR42","doi-asserted-by":"crossref","unstructured":"Sharan, R., Burdick, J.: Finite state control of POMDPs with LTL specifications. In: IEEE American Control Conference, pp. 501\u2013508 (2014)","DOI":"10.1109\/ACC.2014.6858909"},{"key":"23_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-40349-1_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"Y Shoukry","year":"2013","unstructured":"Shoukry, Y., Martin, P., Tabuada, P., Srivastava, M.: Non-invasive spoofing attacks for anti-lock braking systems. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 55\u201372. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_4"},{"key":"23_CR44","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-0-387-75462-8_6","volume-title":"Critical Infrastructure Protection","author":"J Slay","year":"2008","unstructured":"Slay, J., Miller, M.: Lessons learned from the maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) ICCIP 2007. IIFIP, vol. 253, pp. 73\u201382. Springer, Boston, MA (2008). https:\/\/doi.org\/10.1007\/978-0-387-75462-8_6"},{"issue":"7","key":"23_CR45","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1177\/0278364912444146","volume":"31","author":"J Steinhardt","year":"2012","unstructured":"Steinhardt, J., Tedrake, R.: Finite-time regional verification of stochastic non-linear systems. Int. J. Robot. Res. 31(7), 901\u2013923 (2012)","journal-title":"Int. J. Robot. Res."},{"issue":"3","key":"23_CR46","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.tej.2017.02.006","volume":"30","author":"JE Sullivan","year":"2017","unstructured":"Sullivan, J.E., Kamensky, D.: How cyber-attacks in Ukraine show the vulnerability of the US power grid. Electr. J. 30(3), 30\u201335 (2017)","journal-title":"Electr. J."},{"issue":"2","key":"23_CR47","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1137\/0201010","volume":"1","author":"R Tarjan","year":"1972","unstructured":"Tarjan, R.: Depth-first search and linear graph algorithms. SIAM J. Comput. 1(2), 146\u2013160 (1972)","journal-title":"SIAM J. Comput."},{"key":"23_CR48","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1080\/10556789908805762","volume":"11","author":"KC Toh","year":"1999","unstructured":"Toh, K.C., Todd, M.J., T\u00fct\u00fcnc\u00fc, R.H.: SDPT3: A MATLAB software package for semidefinite programming. Optim. Methods Softw. 11, 545\u2013581 (1999)","journal-title":"Optim. Methods Softw."},{"issue":"11","key":"23_CR49","doi-asserted-by":"publisher","first-page":"3344","DOI":"10.1109\/TAC.2015.2511722","volume":"61","author":"T Wongpiromsarn","year":"2015","unstructured":"Wongpiromsarn, T., Topcu, U., Lamperski, A.: Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems. IEEE Trans. Autom. Control 61(11), 3344\u20133355 (2015)","journal-title":"IEEE Trans. Autom. Control"},{"key":"23_CR50","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.automatica.2018.04.022","volume":"94","author":"I Yang","year":"2018","unstructured":"Yang, I.: A dynamic game approach to distributionally robust safety specifications for stochastic systems. Automatica 94, 94\u2013101 (2018)","journal-title":"Automatica"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32430-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T21:58:30Z","timestamp":1611611910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32430-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030324292","9783030324308"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32430-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.gamesec-conf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}