{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:50:51Z","timestamp":1743090651743,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031748349"},{"type":"electronic","value":"9783031748356"}],"license":[{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74835-6_7","type":"book-chapter","created":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T06:01:53Z","timestamp":1728540113000},"page":"124-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Contested Logistics: A Game-Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Jakub","family":"\u010cern\u00fd","sequence":"first","affiliation":[]},{"given":"Chun Kai","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Darshan","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"given":"Jingwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Farina","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kroer","sequence":"additional","affiliation":[]},{"given":"Garud","family":"Iyengar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,11]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1016\/j.cor.2012.10.002","volume":"40","author":"A Agra","year":"2013","unstructured":"Agra, A., Christiansen, M., Figueiredo, R., Hvattum, L.M., Poss, M., Requejo, C.: The robust vehicle routing problem with time windows. Comput. Oper. Res. 40(3), 856\u2013866 (2013)","journal-title":"Comput. Oper. Res."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.cie.2017.10.030","volume":"115","author":"KA Alotaibi","year":"2018","unstructured":"Alotaibi, K.A., Rosenberger, J.M., Mattingly, S.P., Punugu, R.K., Visoldilokpun, S.: Unmanned aerial vehicle routing in the presence of threats. Comput. Industr. Eng. 115, 190\u2013205 (2018)","journal-title":"Comput. Industr. Eng."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1017\/9781316676714.021","volume":"2","author":"B An","year":"2017","unstructured":"An, B., Tambe, M., Sinha, A.: Stackelberg security games (SSG) basics and application overview. Improving Homeland Secur. Decis. 2, 485 (2017)","journal-title":"Improving Homeland Secur. Decis."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"112974","DOI":"10.1016\/j.eswa.2019.112974","volume":"141","author":"R Ausseil","year":"2020","unstructured":"Ausseil, R., Gedik, R., Bednar, A., Cowan, M.: Identifying sufficient deception in military logistics. Expert Syst. Appl. 141, 112974 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"3.4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1147\/rd.513.0391","volume":"51","author":"F Barahona","year":"2007","unstructured":"Barahona, F., et al.: Inventory allocation and transportation scheduling for logistics of network-centric military operations. IBM J. Res. Dev. 51(3.4), 391\u2013407 (2007)","journal-title":"IBM J. Res. Dev."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bell, J.E., Griffis, S.E.: Military applications of location analysis. Appl. Location Anal. 403\u2013433 (2015)","DOI":"10.1007\/978-3-319-20282-2_17"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.orl.2015.11.005","volume":"44","author":"D Bertsimas","year":"2016","unstructured":"Bertsimas, D., Nasrabadi, E., Orlin, J.B.: On the power of randomization in network interdiction. Oper. Res. Lett. 44(1), 114\u2013120 (2016)","journal-title":"Oper. Res. Lett."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.cie.2017.11.019","volume":"115","author":"MM Bidgoli","year":"2018","unstructured":"Bidgoli, M.M., Kheirkhah, A.: An arc interdiction vehicle routing problem with information asymmetry. Comput. Industr. Eng. 115, 520\u2013531 (2018)","journal-title":"Comput. Industr. Eng."},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1177\/1548512918798056","volume":"17","author":"M Blom","year":"2020","unstructured":"Blom, M., Shekh, S., Gossink, D., Miller, T., Pearce, A.R.: Inventory routing for defense: moving supplies in adversarial and partially observable environments. J. Defense Model. Simul. 17(1), 55\u201381 (2020)","journal-title":"J. Defense Model. Simul."},{"issue":"6218","key":"7_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1126\/science.1259433","volume":"347","author":"M Bowling","year":"2015","unstructured":"Bowling, M., Burch, N., Johanson, M., Tammelin, O.: Heads-up limit hold\u2019em poker is solved. Science 347(6218), 145\u2013149 (2015)","journal-title":"Science"},{"issue":"6374","key":"7_CR11","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1126\/science.aao1733","volume":"359","author":"N Brown","year":"2018","unstructured":"Brown, N., Sandholm, T.: Superhuman AI for heads-up no-limit poker: Libratus beats top professionals. Science 359(6374), 418\u2013424 (2018)","journal-title":"Science"},{"issue":"6456","key":"7_CR12","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1126\/science.aay2400","volume":"365","author":"N Brown","year":"2019","unstructured":"Brown, N., Sandholm, T.: Superhuman AI for multiplayer poker. Science 365(6456), 885\u2013890 (2019)","journal-title":"Science"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","volume":"94","author":"RL Church","year":"2004","unstructured":"Church, R.L., Scaparra, M.P., Middleton, R.S.: Identifying critical infrastructure: the median and covering facility interdiction problems. Ann. Assoc. Am. Geogr. 94(3), 491\u2013502 (2004)","journal-title":"Ann. Assoc. Am. Geogr."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Conitzer, V., Sandholm, T.: Computing the optimal strategy to commit to. In: Proceedings of the 7th ACM Conference on Electronic Commerce, pp. 82\u201390 (2006)","DOI":"10.1145\/1134707.1134717"},{"key":"7_CR15","unstructured":"Cook, E.: Ukraine destroys key rail bridge connecting occupied Mariupol to Russia (2024). https:\/\/www.newsweek.com\/ukraine-bridge-russia-logistics-mariupol-donetsk-crimea-1858516. Accessed 19 June 2024"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1080\/00045601003794908","volume":"100","author":"D Cowen","year":"2010","unstructured":"Cowen, D.: A geography of logistics: market authority and the security of supply chains. Ann. Assoc. Am. Geogr. 100(3), 600\u2013620 (2010)","journal-title":"Ann. Assoc. Am. Geogr."},{"key":"7_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27516-9","volume-title":"Logistics Systems Analysis","author":"C Daganzo","year":"2005","unstructured":"Daganzo, C.: Logistics Systems Analysis. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/3-540-27516-9"},{"issue":"5","key":"7_CR18","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1287\/opre.46.5.625","volume":"46","author":"E Erkut","year":"1998","unstructured":"Erkut, E., Verter, V.: Modeling of transport risk for hazardous materials. Oper. Res. 46(5), 625\u2013642 (1998)","journal-title":"Oper. Res."},{"key":"7_CR19","unstructured":"Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp. 2589\u20132595 (2015)"},{"key":"7_CR20","volume-title":"Introduction to Logistics Systems Planning and Control","author":"G Ghiani","year":"2004","unstructured":"Ghiani, G., Laporte, G., Musmanno, R.: Introduction to Logistics Systems Planning and Control. Wiley, Hoboken (2004)"},{"key":"7_CR21","unstructured":"Gurobi Optimization, LLC: Gurobi Optimizer Reference Manual (2023). https:\/\/www.gurobi.com"},{"key":"7_CR22","unstructured":"Hill, R., Pohl, E.: An overview of meta-heuristics and their use in military modeling. Handb. Milit. Industr. Eng. (2009)"},{"key":"7_CR23","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-1-4614-5416-8_2","volume-title":"Moving Target Defense II","author":"M Jain","year":"2013","unstructured":"Jain, M., An, B., Tambe, M.: Security games applied to real-world: research contributions and challenges. In: Jajodia, S., Ghosh, A., Subrahmanian, V., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense II. Advances in Information Security, vol. 100, pp. 15\u201339. Springer, New York (2013)"},{"key":"7_CR24","volume-title":"Military Operations Research: Quantitative Decision Making","author":"NK Jaiswal","year":"2012","unstructured":"Jaiswal, N.K.: Military Operations Research: Quantitative Decision Making, vol. 5. Springer, Heidelberg (2012)"},{"key":"7_CR25","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ord\u00f3nez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games (2009)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a024, pp. 805\u2013810 (2010)","DOI":"10.1609\/aaai.v24i1.7638"},{"issue":"9","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1057\/jors.2011.136","volume":"63","author":"C Lee","year":"2012","unstructured":"Lee, C., Lee, K., Park, S.: Robust vehicle routing problem with deadlines and travel time\/demand uncertainty. J. Oper. Res. Soc. 63(9), 1294\u20131306 (2012)","journal-title":"J. Oper. Res. Soc."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Lee, J.M.Y., Wong, E.Y.C.: Suez canal blockage: an analysis of legal impact, risks and liabilities to the global supply chain. In: MATEC Web of Conferences, vol.\u00a0339, p. 01019. EDP Sciences (2021)","DOI":"10.1051\/matecconf\/202133901019"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1287\/trsc.25.2.100","volume":"25","author":"GF List","year":"1991","unstructured":"List, G.F., Mirchandani, P.B., Turnquist, M.A., Zografos, K.G.: Modeling and analysis for hazardous materials transportation: risk analysis, routing\/scheduling and facility location. Transp. Sci. 25(2), 100\u2013114 (1991)","journal-title":"Transp. Sci."},{"issue":"3","key":"7_CR30","first-page":"14","volume":"70","author":"CJ McMahon","year":"2017","unstructured":"McMahon, C.J.: Maritime trade warfare: a strategy for the twenty-first century? Naval War Coll. Rev. 70(3), 14\u201338 (2017)","journal-title":"Naval War Coll. Rev."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"v.\u00a0Neumann, J.: Zur theorie der gesellschaftsspiele. Math. Annalen 100(1), 295\u2013320 (1928)","DOI":"10.1007\/BF01448847"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Ord\u00f3\u00f1ez, F.: Robust vehicle routing. In: Risk and Optimization in an Uncertain World, pp. 153\u2013178. INFORMS (2010)","DOI":"10.1287\/educ.1100.0078"},{"key":"7_CR33","unstructured":"Pfohl, H.C.: Logistics systems. The faculty of ILiM, Pozna\u0144 (1998)"},{"key":"7_CR34","unstructured":"Pita, J., et al.: Armor security for Los Angeles international airport. In: AAAI, pp. 1884\u20131885 (2008)"},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1111\/itor.12669","volume":"27","author":"MEH Sadati","year":"2020","unstructured":"Sadati, M.E.H., Aksen, D., Aras, N.: The r-interdiction selective multi-depot vehicle routing problem. Int. Trans. Oper. Res. 27(2), 835\u2013866 (2020)","journal-title":"Int. Trans. Oper. Res."},{"key":"7_CR36","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s12198-010-0037-0","volume":"3","author":"M Salani","year":"2010","unstructured":"Salani, M., Duyckaerts, G., Swartz, P.G.: Ambush avoidance in vehicle routing for valuable delivery. J. Transp. Secur. 3, 41\u201355 (2010)","journal-title":"J. Transp. Secur."},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Salmeron, J., Wood, R.K., Morton, D.P.: A stochastic program for optimizing military sealift subject to attack. Milit. Oper. Res. 19\u201339 (2009)","DOI":"10.5711\/morj.14.2.19"},{"key":"7_CR38","unstructured":"Shieh, E., et al.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13\u201320 (2012)"},{"key":"7_CR39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811654","volume-title":"Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations","author":"Y Shoham","year":"2008","unstructured":"Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)"},{"key":"7_CR40","series-title":"Springer Optimization and Its Applications","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-0-387-77247-9_24","volume-title":"Pareto Optimality, Game Theory And Equilibria","author":"JC Smith","year":"2008","unstructured":"Smith, J.C., Lim, C.: Algorithms for network interdiction and fortification games. In: Chinchuluun, A., Pardalos, P.M., Migdalas, A., Pitsoulis, L. (eds.) Pareto Optimality, Game Theory And Equilibria. Springer Optimization and Its Applications, vol. 17, pp. 609\u2013644. Springer, New York (2008). https:\/\/doi.org\/10.1007\/978-0-387-77247-9_24"},{"issue":"3","key":"7_CR41","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1016\/j.ejor.2019.06.024","volume":"283","author":"JC Smith","year":"2020","unstructured":"Smith, J.C., Song, Y.: A survey of network interdiction models and algorithms. Eur. J. Oper. Res. 283(3), 797\u2013811 (2020)","journal-title":"Eur. J. Oper. Res."},{"key":"7_CR42","unstructured":"Studio, P.D.: Hearts of iron IV (2016). https:\/\/www.paradoxinteractive.com\/games\/hearts-of-iron-iv\/about"},{"issue":"5","key":"7_CR43","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1080\/07408170701745378","volume":"40","author":"I Sungur","year":"2008","unstructured":"Sungur, I., Ord\u00f3nez, F., Dessouky, M.: A robust optimization approach for the capacitated vehicle routing problem with demand uncertainty. IIE Trans. 40(5), 509\u2013523 (2008)","journal-title":"IIE Trans."},{"issue":"2","key":"7_CR44","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1287\/opre.43.2.243","volume":"43","author":"A Washburn","year":"1995","unstructured":"Washburn, A., Wood, K.: Two-person zero-sum games for network interdiction. Oper. Res. 43(2), 243\u2013251 (1995)","journal-title":"Oper. Res."},{"issue":"6","key":"7_CR45","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1287\/opre.12.6.934","volume":"12","author":"R Wollmer","year":"1964","unstructured":"Wollmer, R.: Removing arcs from a network. Oper. Res. 12(6), 934\u2013940 (1964)","journal-title":"Oper. Res."},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Xu, H.: The mysteries of security games: equilibrium computation becomes combinatorial algorithm design. In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 497\u2013514 (2016)","DOI":"10.1145\/2940716.2940796"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74835-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T06:02:34Z","timestamp":1728540154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74835-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,11]]},"ISBN":["9783031748349","9783031748356"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74835-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,11]]},"assertion":[{"value":"11 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Decision and Game Theory for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York City, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}