{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:41:47Z","timestamp":1760305307434,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032080660"},{"type":"electronic","value":"9783032080677"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08067-7_1","type":"book-chapter","created":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:37:20Z","timestamp":1760301440000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Worst Case Assurance Guarantees for\u00a0Black-Box Perimeter Defense Policies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9945-979X","authenticated-orcid":false,"given":"Richard","family":"Frost","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9825-5359","authenticated-orcid":false,"given":"Betty H. C.","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0813-7867","authenticated-orcid":false,"given":"Shaunak D.","family":"Bopardikar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bajaj, S., Torng, E., Bopardikar, S.D.: Competitive perimeter defense on a line. In: 2021 American control conference (ACC), pp. 3196\u20133201. IEEE (2021)","key":"1_CR1","DOI":"10.23919\/ACC50511.2021.9483308"},{"doi-asserted-by":"crossref","unstructured":"Bajaj, S., Torng, E., Bopardikar, S.D.: Competitive perimeter defense in linear environments. Theor. Comput. Sci. 115262 (2025)","key":"1_CR2","DOI":"10.1016\/j.tcs.2025.115262"},{"doi-asserted-by":"crossref","unstructured":"Bajaj, S., et al.: Competitive perimeter defense of conical environments. In: 2022 IEEE 61st Conference on Decision and Control (CDC), pp. 6586\u20136593. IEEE (2022)","key":"1_CR3","DOI":"10.1109\/CDC51059.2022.9993007"},{"unstructured":"Dalrymple, D., et\u00a0al.: Towards guaranteed safe AI: a framework for ensuring robust and reliable AI systems. arXiv preprint arXiv:2405.06624 (2024)","key":"1_CR4"},{"doi-asserted-by":"crossref","unstructured":"Das, G., Shishika, D.: Guarding a translating line with an attached defender. In: 2022 American Control Conference (ACC), pp. 4436\u20134442. IEEE (2022)","key":"1_CR5","DOI":"10.23919\/ACC53348.2022.9867732"},{"doi-asserted-by":"crossref","unstructured":"Davydov, A., Rivera-Ortiz, P., Diaz-Mercado, Y.: Pursuer coordination in multi-player reach-avoid games through control barrier functions. In: 2021 American Control Conference (ACC), pp. 3222\u20133227. IEEE (2021)","key":"1_CR6","DOI":"10.23919\/ACC50511.2021.9483310"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1007\/s10817-018-09509-5","volume":"63","author":"T Dreossi","year":"2019","unstructured":"Dreossi, T., Donz\u00e9, A., Seshia, S.A.: Compositional falsification of cyber-physical systems with machine learning components. J. Autom. Reason. 63(4), 1031\u20131053 (2019)","journal-title":"J. Autom. Reason."},{"unstructured":"Frost, R.L., Bopardikar, S.D.: Competitive perimeter defense in tree environments. arXiv: 2407.17626 (2025). https:\/\/arxiv.org\/abs\/2407.17626","key":"1_CR8"},{"unstructured":"Hu, J., Wellman, M.P.: Nash q-learning for general-sum stochastic games. J. Mach. Learn. Res. 4(Nov), 1039\u20131069 (2003)","key":"1_CR9"},{"doi-asserted-by":"crossref","unstructured":"Kouvaritakis, B., Cannon, M.: Model Predictive Control, vol. 38, no. 13-56, p. 7. Springer, Cham (2016)","key":"1_CR10","DOI":"10.1007\/978-3-319-24853-0_2"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"1104745","DOI":"10.3389\/fcteg.2023.1104745","volume":"4","author":"ES Lee","year":"2023","unstructured":"Lee, E.S., Zhou, L., Ribeiro, A., Kumar, V.: Graph neural networks for decentralized multi-agent perimeter defense. Front. Control Eng. 4, 1104745 (2023)","journal-title":"Front. Control Eng."},{"issue":"8","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TAC.2011.2105730","volume":"56","author":"K Margellos","year":"2011","unstructured":"Margellos, K., Lygeros, J.: Hamilton-Jacobi formulation for reach-avoid differential games. IEEE Trans. Autom. Control 56(8), 1849\u20131861 (2011)","journal-title":"IEEE Trans. Autom. Control"},{"doi-asserted-by":"crossref","unstructured":"Namala, P., Vaidya, A., Herrmann, J.W.: Data driven metareasoning for defending a perimeter against cooperative intrusion. In: International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, vol. 88353, p. V02BT02A039. American Society of Mechanical Engineers (2024)","key":"1_CR13","DOI":"10.1115\/DETC2024-143159"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash Jr","year":"1950","unstructured":"Nash, J.F., Jr.: Equilibrium points in n-person games. Proc. Natl. Acad. Sci. 36(1), 48\u201349 (1950)","journal-title":"Proc. Natl. Acad. Sci."},{"doi-asserted-by":"crossref","unstructured":"Pourghorban, A., Dorothy, M., Shishika, D., Von\u00a0Moll, A., Maity, D.: Target defense against sequentially arriving intruders. In: IEEE International Conference on Decision and Control (CDC), pp. 6594\u20136601 (2022)","key":"1_CR15","DOI":"10.1109\/CDC51059.2022.9992425"},{"issue":"4","key":"1_CR16","doi-asserted-by":"publisher","first-page":"2095","DOI":"10.1137\/21M1426675","volume":"60","author":"MO Sayin","year":"2022","unstructured":"Sayin, M.O., Parise, F., Ozdaglar, A.: Fictitious play in zero-sum stochastic games. SIAM J. Control. Optim. 60(4), 2095\u20132114 (2022)","journal-title":"SIAM J. Control. Optim."},{"issue":"7","key":"1_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/3503914","volume":"65","author":"SA Seshia","year":"2022","unstructured":"Seshia, S.A., Sadigh, D., Sastry, S.S.: Toward verified artificial intelligence. Commun. ACM 65(7), 46\u201355 (2022)","journal-title":"Commun. ACM"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-030-64793-3_26","volume-title":"Decision and Game Theory for Security","author":"D Shishika","year":"2020","unstructured":"Shishika, D., Kumar, V.: A review of multi agent perimeter defense games. In: GameSec 2020. LNCS, vol. 12513, pp. 472\u2013485. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64793-3_26"},{"issue":"2","key":"1_CR19","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1145\/2786.2793","volume":"28","author":"DD Sleator","year":"1985","unstructured":"Sleator, D.D., Tarjan, R.E.: Amortized efficiency of list update and paging rules. Commun. ACM 28(2), 202\u2013208 (1985)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Thompson, J.M., Goss, Q., Akba\u015f, M.\u0130.: Boundary adherence and exploration in high dimensions for validation of black-box systems. In: 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), pp.\u00a01\u20136. IEEE (2022)","key":"1_CR20","DOI":"10.1109\/WF-IoT54382.2022.10152207"},{"doi-asserted-by":"crossref","unstructured":"Thousif, P.M., Velhal, S., Sundaram, S., Sundararajan, N.: A decentralized greedy assignment-learning spiking neural network-based solution for a perimeter defense problem. In: 2025 IEEE Symposium on Computational Intelligence in Security, Defence and Biometrics (CISDB), pp.\u00a01\u20136. IEEE (2025)","key":"1_CR21","DOI":"10.1109\/CISDB64969.2025.11010482"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-88494-9_19","volume-title":"Runtime Verification","author":"H Torfah","year":"2021","unstructured":"Torfah, H., Junges, S., Fremont, D.J., Seshia, S.A.: Formal analysis of AI-based autonomy: from modeling to runtime assurance. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 311\u2013330. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_19"},{"unstructured":"Watkins, C.J.C.H.: Learning from delayed rewards. Ph.D. thesis (1989)","key":"1_CR23"},{"issue":"10","key":"1_CR24","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3448248","volume":"64","author":"JM Wing","year":"2021","unstructured":"Wing, J.M.: Trustworthy AI. Commun. ACM 64(10), 64\u201371 (2021)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08067-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T21:02:40Z","timestamp":1760302960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08067-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9783032080660","9783032080677"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08067-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article. The views expressed in this paper are those of the authors and do not reflect the official policy or position of the United States Government, Department of Defense, or its components.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}