{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:31:45Z","timestamp":1742963505458,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030927899"},{"type":"electronic","value":"9783030927905"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-92790-5_19","type":"book-chapter","created":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T16:14:54Z","timestamp":1641226494000},"page":"242-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-agent Deception in\u00a0Attack-Defense Stochastic Game"],"prefix":"10.1007","author":[{"given":"Xueting","family":"Li","sequence":"first","affiliation":[]},{"given":"Sha","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Katia","family":"Sycara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,3]]},"reference":[{"issue":"6456","key":"19_CR1","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1126\/science.aay2400","volume":"365","author":"N Brown","year":"2019","unstructured":"Brown, N., Sandholm, T.: Superhuman AI for multiplayer poker. Science 365(6456), 885\u2013890 (2019)","journal-title":"Science"},{"issue":"10","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1002\/sec.242","volume":"4","author":"TE Carroll","year":"2011","unstructured":"Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162\u20131172 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"19_CR3","unstructured":"Chaslot, G., Bakkes, S., Szita, I., Spronck, P.: Monte-Carlo tree search: a new framework for game AI. In: AIIDE (2008)"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"5772","DOI":"10.1109\/LRA.2020.3010740","volume":"5","author":"Z Deng","year":"2020","unstructured":"Deng, Z., Kong, Z.: Multi-agent cooperative pursuit-defense strategy against one single attacker. IEEE Robot. Autom. Lett. 5(4), 5772\u20135778 (2020)","journal-title":"IEEE Robot. Autom. Lett."},{"key":"19_CR5","unstructured":"Durkota, K., Lis\u1ef3, V., Bo\u0161ansk\u1ef3, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"19_CR6","unstructured":"Gilpin, A., Sandholm, T.: Solving two-person zero-sum repeated games of incomplete information. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, vol. 2, pp. 903\u2013910 (2008)"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1613\/jair.1579","volume":"24","author":"PJ Gmytrasiewicz","year":"2005","unstructured":"Gmytrasiewicz, P.J., Doshi, P.: A framework for sequential planning in multi-agent settings. J. Artif. Intell. Res. 24, 49\u201379 (2005)","journal-title":"J. Artif. Intell. Res."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Harsanyi, J.C.: Games with incomplete information played by \u201cBayesian\u201d players, i\u2013iii part i. the basic model. Manag. Sci. 14(3), 159\u2013182 (1967)","DOI":"10.1287\/mnsc.14.3.159"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-319-68711-7_15","volume-title":"Decision and Game Theory for Security","author":"K Hor\u00e1k","year":"2017","unstructured":"Hor\u00e1k, K., Zhu, Q., Bo\u0161ansk\u1ef3, B.: Manipulating adversary\u2019s belief: a dynamic game approach to deception by design for proactive network security. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds.) GameSec 2017. LNCS, vol. 10575, pp. 273\u2013294. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68711-7_15"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Li, L., Shamma, J.: LP formulation of asymmetric zero-sum stochastic games. In: 53rd IEEE Conference on Decision and Control, pp. 1930\u20131935. IEEE (2014)","DOI":"10.1109\/CDC.2014.7039680"},{"key":"19_CR11","unstructured":"Lis\u1ef3, V., Zivan, R., Sycara, K., P\u011bchou\u010dek, M.: Deception in networks of mobile sensing agents. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 1031\u20131038 (2010)"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J.: Non-cooperative games. Ann. Math. 54, 286\u2013295 (1951)","journal-title":"Ann. Math."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Wang, Y., Sinha, A., Wellman, M.P.: Deception in finitely repeated security games. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a033, pp. 2133\u20132140 (2019)","DOI":"10.1609\/aaai.v33i01.33012133"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-34266-0_12","volume-title":"Decision and Game Theory for Security","author":"R P\u00edbil","year":"2012","unstructured":"P\u00edbil, R., Lis\u00fd, V., Kiekintveld, C., Bo\u0161ansk\u00fd, B., P\u011bchou\u010dek, M.: Game theoretic model of strategic honeypot selection in computer networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 201\u2013220. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34266-0_12"},{"key":"19_CR15","unstructured":"Sengupta, S., Kambhampati, S.: Multi-agent reinforcement learning in Bayesian Stackelberg Markov games for adaptive moving target defense. arXiv preprint arXiv:2007.10457 (2020)"},{"issue":"10","key":"19_CR16","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1073\/pnas.39.10.1095","volume":"39","author":"LS Shapley","year":"1953","unstructured":"Shapley, L.S.: Stochastic games. Proc. Natl. Acad. Sci. 39(10), 1095\u20131100 (1953)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"3","key":"19_CR17","first-page":"143","volume":"60","author":"D Sinc\u00e1k","year":"2009","unstructured":"Sinc\u00e1k, D.: Multi-robot control system for pursuit-evasion problem. J. Electr. Eng. 60(3), 143\u2013148 (2009)","journal-title":"J. Electr. Eng."},{"issue":"1","key":"19_CR18","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10115-012-0569-7","volume":"38","author":"A Torre\u00f1o","year":"2014","unstructured":"Torre\u00f1o, A., Onaindia, E., Sapena, \u00d3.: A flexible coupling approach to multi-agent planning under incomplete information. Knowl. Inf. Syst. 38(1), 141\u2013178 (2014)","journal-title":"Knowl. Inf. Syst."},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Vidal, R., Rashid, S., Sharp, C., Shakernia, O., Kim, J., Sastry, S.: Pursuit-evasion games with unmanned ground and aerial vehicles. In: Proceedings 2001 ICRA. IEEE International Conference on Robotics and Automation (Cat. No. 01CH37164), vol.\u00a03, pp. 2948\u20132955. IEEE (2001)","DOI":"10.1109\/ROBOT.2001.933069"},{"key":"19_CR20","series-title":"Springer Proceedings in Advanced Robotics","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-030-05816-6_18","volume-title":"Distributed Autonomous Robotic Systems","author":"S Yi","year":"2019","unstructured":"Yi, S., Nam, C., Sycara, K.: Indoor pursuit-evasion with hybrid hierarchical partially observable Markov decision processes for multi-robot systems. In: Correll, N., Schwager, M., Otte, M. (eds.) Distributed Autonomous Robotic Systems. SPAR, vol. 9, pp. 251\u2013264. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05816-6_18"},{"issue":"2","key":"19_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","volume":"203","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multiple-period attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409\u2013418 (2010)","journal-title":"Eur. J. Oper. Res."}],"container-title":["Springer Proceedings in Advanced Robotics","Distributed Autonomous Robotic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-92790-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:57:23Z","timestamp":1726415843000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-92790-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030927899","9783030927905"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-92790-5_19","relation":{},"ISSN":["2511-1256","2511-1264"],"issn-type":[{"type":"print","value":"2511-1256"},{"type":"electronic","value":"2511-1264"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DARS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium Distributed Autonomous Robotic Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dars2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}