{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:15:08Z","timestamp":1746591308751,"version":"3.40.5"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030461492"},{"type":"electronic","value":"9783030461508"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-46150-8_42","type":"book-chapter","created":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T01:02:40Z","timestamp":1588294960000},"page":"725-740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Cooney","sequence":"first","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Bondi","sequence":"additional","affiliation":[]},{"given":"Thanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Phebe","family":"Vayanos","sequence":"additional","affiliation":[]},{"given":"Hailey","family":"Winetrobe","sequence":"additional","affiliation":[]},{"given":"Edward A.","family":"Cranford","sequence":"additional","affiliation":[]},{"given":"Cleotilde","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Lebiere","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,30]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"An, B., Tambe, M., Ordonez, F., Shieh, E., Kiekintveld, C.: Refinement of strong Stackelberg equilibria in security games. In: Twenty-Fifth AAAI (2011)","DOI":"10.1609\/aaai.v25i1.7864"},{"key":"42_CR2","unstructured":"Basilico, N., Gatti, N.: Strategic guard placement for optimal response to alarms in security games. In: Proceedings of the 2014 AAMAS, pp. 1481\u20131482 (2014)"},{"key":"42_CR3","unstructured":"Cranford, E.A., Gonzalez, C., Aggarwal, P., Cooney, S., Tambe, M., Lebiere, C.: towards personalized deceptive signaling for cyber defense using cognitive models. In: Proceedings of the Proceedings of the 17th ICCM (2019, in press)"},{"key":"42_CR4","unstructured":"Cranford, E.A., Lebiere, C., Gonzalez, C., Cooney, S., Vayanos, P., Tambe, M.: Learning about cyber deception through simulations: predictions of human decision making with deceptive signals in Stackelberg Security Games. In: CogSci 2018, pp. 25\u201328 (2018)"},{"key":"42_CR5","unstructured":"Delle Fave, F.M., et al.: Security games in the field: an initial study on a transit system. In: Proceedings of the 2014 AAMAS, pp. 1363\u20131364 (2014)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Ferguson-Walter, K., et al.: The Tularosa study: an experimental design and implementation to quantify the effectiveness of cyber deception. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)","DOI":"10.24251\/HICSS.2019.874"},{"key":"42_CR7","unstructured":"Fraunholz, D., et al.: Demystifying deception technology: a survey. arXiv preprint arXiv:1804.06196 (2018)"},{"key":"42_CR8","unstructured":"Gholami, S., et al.: Adversary models account for imperfect crime data: forecasting and planning against real-world poachers (2018)"},{"key":"42_CR9","unstructured":"Gholami, S., Yadav, A., Tran-Thanh, L., Dilkina, B., Tambe, M.: Don\u2019t put all your strategies in one basket: playing green security games with imperfect prior knowledge. In: Proceedings of the 18th AAMAS, pp. 395\u2013403 (2019)"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Guo, Q., An, B., Bosansk\u1ef3, B., Kiekintveld, C.: Comparing strategic secrecy and Stackelberg commitment in security games. In: IJCAI, pp. 3691\u20133699 (2017)","DOI":"10.24963\/ijcai.2017\/516"},{"key":"42_CR11","unstructured":"Hartford, J.S., Wright, J.R., Leyton-Brown, K.: Deep learning for predicting human strategic behavior. In: NIPS, pp. 2424\u20132432 (2016)"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"He, X., Islam, M.M., Jin, R., Dai, H.: Foresighted deception in dynamic security games. In: 2017 IEEE ICC, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7996811"},{"key":"42_CR13","unstructured":"Kar, D., et al.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th AAMAS, pp. 159\u2013167 (2017)"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: Twenty-Fourth AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7638"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Kraus, S.: Predicting human decision-making: from prediction to action. In: Proceedings of the 6th HAI, p. 1. ACM (2018)","DOI":"10.1145\/3284432.3287194"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Krol, K., Moroz, M., Sasse, M.A.: Don\u2019t work. can\u2019t work? Why it\u2019s time to rethink security warnings. In: Risk and Security of Internet and Systems (CRiSIS), 2012, pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"42_CR17","unstructured":"Luber, S., Yin, Z., Delle Fave, F.M., Jiang, A.X., Tambe, M., Sullivan, J.P.: Game-theoretic patrol strategies for transit systems: the trusts system and its mobile app. In: AAMAS, pp. 1377\u20131378. Citeseer (2013)"},{"issue":"1","key":"42_CR18","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1111\/1745-9125.12028","volume":"52","author":"D Maimon","year":"2014","unstructured":"Maimon, D., Alper, M., Sobesto, B., Cukier, M.: Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology 52(1), 33\u201359 (2014)","journal-title":"Criminology"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wang, Y., Sinha, A., Wellman, M.P.: Deception in finitely repeated security games. In: 33th AAAI (2019)","DOI":"10.1609\/aaai.v33i01.33012133"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: AAAI (2013)","DOI":"10.1609\/aaai.v27i1.8599"},{"key":"42_CR21","unstructured":"Okamoto, S., Hazon, N., Sycara, K.: Solving non-zero sum multiagent network flow security games with attack costs. In: Proceedings of the 11th AAMAS-Volume 2, pp. 879\u2013888 (2012)"},{"key":"42_CR22","unstructured":"Pawlick, J., Zhu, Q.: Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458 (2015)"},{"key":"42_CR23","unstructured":"Pita, J., Jain, M., Ord\u00f3\u00f1ez, F., Tambe, M., Kraus, S., Magori-Cohen, R.: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties. In: Proceedings of the 8th AAMAS-Volume 1, pp. 369\u2013376 (2009)"},{"issue":"5","key":"42_CR24","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.126","volume":"10","author":"SW Smith","year":"2012","unstructured":"Smith, S.W.: Security and cognitive bias: exploring the role of the mind. IEEE Secur. Priv. 10(5), 75\u201378 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"42_CR25","doi-asserted-by":"publisher","first-page":"8125","DOI":"10.1007\/978-3-642-27737-5","volume-title":"Encyclopedia of Complexity and Systems Science","author":"J Sobel","year":"2009","unstructured":"Sobel, J.: Signaling games. In: Meyers, R.A. (ed.) Encyclopedia of Complexity and Systems Science, vol. 19, pp. 8125\u20138139. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-27737-5"},{"key":"42_CR26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)"},{"key":"42_CR27","volume-title":"Classification and Regression Trees (Cart) Theory and Applications","author":"R Timofeev","year":"2004","unstructured":"Timofeev, R.: Classification and Regression Trees (Cart) Theory and Applications. Humboldt University, Berlin (2004)"},{"issue":"3","key":"42_CR28","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1007\/s10489-018-1307-y","volume":"49","author":"B Wang","year":"2018","unstructured":"Wang, B., Zhang, Y., Zhou, Z.-H., Zhong, S.: On repeated stackelberg security game with the cooperative human behavior model for wildlife protection. Appl. Intell. 49(3), 1002\u20131015 (2018). https:\/\/doi.org\/10.1007\/s10489-018-1307-y","journal-title":"Appl. Intell."},{"key":"42_CR29","first-page":"70","volume":"2016","author":"A Wilczy\u0144ski","year":"2016","unstructured":"Wilczy\u0144ski, A., Jak\u00f3bik, A., Ko\u0142odziej, J.: Stackelberg security games: models, applications and computational aspects. J. Telecommun. Inf. Technol. 2016, 70\u201379 (2016)","journal-title":"J. Telecommun. Inf. Technol."},{"key":"42_CR30","doi-asserted-by":"crossref","unstructured":"Xu, H., Rabinovich, Z., Dughmi, S., Tambe, M.: Exploring information asymmetry in two-stage security games. In: AAAI, pp. 1057\u20131063 (2015)","DOI":"10.1609\/aaai.v29i1.9290"},{"key":"42_CR31","doi-asserted-by":"crossref","unstructured":"Xu, H., Wang, K., Vayanos, P., Tambe, M.: Strategic coordination of human patrollers and mobile sensors with signaling for security games. In: Thirty-Second AAAI (2018)","DOI":"10.1609\/aaai.v32i1.11447"},{"key":"42_CR32","unstructured":"Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., John, R.: Improving resource allocation strategy against human adversaries in security games. In: Twenty-Second IJCAI (2011)"},{"key":"42_CR33","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.artint.2012.11.004","volume":"195","author":"R Yang","year":"2013","unstructured":"Yang, R., Kiekintveld, C., Ord\u00f3\u00f1Ez, F., Tambe, M., John, R.: Improving resource allocation strategies against human adversaries in security games: an extended study. Artif. Intell. 195, 440\u2013469 (2013)","journal-title":"Artif. Intell."},{"key":"42_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-12601-2_1","volume-title":"Decision and Game Theory for Security","author":"C Zhang","year":"2014","unstructured":"Zhang, C., Jiang, A.X., Short, M.B., Brantingham, P.J., Tambe, M.: Defending against opportunistic criminals: new game-theoretic frameworks and algorithms. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 3\u201322. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12601-2_1"},{"key":"42_CR35","unstructured":"Zhang, C., Sinha, A., Tambe, M.: Keeping pace with criminals: designing patrol allocation against adaptive opportunistic criminals. In: Proceedings of the 2015 AAMAS, pp. 1351\u20131359 (2015)"},{"issue":"2","key":"42_CR36","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","volume":"203","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409\u2013418 (2010)","journal-title":"Eur. J. Oper. Res."}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-46150-8_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T09:27:56Z","timestamp":1746523676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-46150-8_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030461492","9783030461508"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-46150-8_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"W\u00fcrzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecmlpkdd2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"733","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"130","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.04","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ECML PKDD Workshops Information: single-blind review, submissions: 200, full papers accepted: 70, short papers accepted: 46","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}