{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:32:56Z","timestamp":1743006776501,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144832"},{"type":"electronic","value":"9783319144849"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14484-9_6","type":"book-chapter","created":{"date-parts":[[2014,12,12]],"date-time":"2014-12-12T14:01:17Z","timestamp":1418392877000},"page":"103-126","source":"Crossref","is-referenced-by-count":6,"title":["Security Games in the Field: Deployments on a Transit System"],"prefix":"10.1007","author":[{"given":"Francesco M. Delle","family":"Fave","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Shieh","sequence":"additional","affiliation":[]},{"given":"Albert Xin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Rosoff","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]},{"given":"John P.","family":"Sullivan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1136\/bmj.316.7125.125","volume":"316","author":"M.J. Bland","year":"1998","unstructured":"Bland, M.J., Kerry, S.M.: Weighted comparison of means. BMJ: British Medical Journal\u00a0316, 125\u2013129 (1998)","journal-title":"BMJ: British Medical Journal"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Brantingham, P., Brantingham, P.: Criminality of place. European Journal on Criminal Policy and Research (1995)","DOI":"10.1007\/BF02242925"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Brown, A., Camerer, C.F., Lovallo, D.: To review or not to review? limited strategic thinking at the movie box office. American Economic Journal: Microeconomics\u00a02 (2012)","DOI":"10.1257\/mic.4.2.1"},{"key":"6_CR4","unstructured":"Brown, M., An, B., Kiekintveld, C., Ordonez, F., Tambe, M.: An extended study on multi-objective security games. JAAMAS (2013)"},{"key":"6_CR5","unstructured":"Conitzer, V.: Computing game-theoretic solutions and applications to security. In: AAAI (2012)"},{"key":"6_CR6","unstructured":"Gatti, N.: Game theoretical insights in strategic patrolling: Model and algorithm in normal form. In: ECAI (2008)"},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1108\/15265940510613688","volume":"6","author":"R. Lisa","year":"2005","unstructured":"Lisa, R., Goldberg, A.N.: Kercheval, and Kiseop Lee. t-statistics for weighted means in credit risk modeling. Journal of Risk Finance\u00a06(4), 349\u2013365 (2005)","journal-title":"Journal of Risk Finance"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Jaulmes, R., Pineau, J., Precup, D.: A formal framework for robot learning and control under model uncertainty. In: ICRA (2007)","DOI":"10.1109\/ROBOT.2007.363632"},{"key":"6_CR9","unstructured":"Jiang, A.X., Yin, Z., Zhang, C., Tambe, M., Kraus, S.: Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In: AAMAS (2013)"},{"key":"6_CR10","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: AAMAS, pp. 233\u2013239 (2009)"},{"key":"6_CR11","unstructured":"Luber, S., Yin, Z., Delle Fave, F.M., Jiang, A.X., Tambe, M., Sullivan, J.P.: Game-theoretic patrol strategies for transit systems: The trusts system and its mobile app (demonstration). In: AAMAS (Demonstrations Track) (2013)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Ostling, R., Wang, J., Tao-yi, J., Chou, E.Y., Camerer, C.F.: Testing game theory in the field: Swedish lupi lottery games. American Economic Journal: Microeconomics (2011)","DOI":"10.2139\/ssrn.1007181"},{"key":"6_CR13","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., Di Renzo, J., Maule, B., Meyer, G.: Protect: A deployed game theoretic system to protect the ports of the united states. In: AAMAS (2012)"},{"key":"6_CR14","unstructured":"Shieh, E., Jain, M., Jiang, A.X., Tambe, M.: Effciently solving joint activity based security games. In: IJCAI (2013)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Short, M.B., D\u2019Orsogna, M.R., Pasour, V.B., Tita, G.E., Brantingham, P.J., Bertozzi, A.L., Chayes, L.B.: A statistical model of criminal behavior. Mathematical Models and Methods in Applied Sciences (2008)","DOI":"10.1142\/S0218202508003029"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press (2011)","DOI":"10.1017\/CBO9780511973031"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Varakantham, P., Lau, H.C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: IAAI (2013)","DOI":"10.1609\/aaai.v27i2.19002"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.: Trusts: Scheduling randomized patrols for fare inspection in transit systems. In: IAAI (2012)","DOI":"10.1609\/aimag.v33i4.2432"},{"key":"6_CR19","unstructured":"Yin, Z., Tambe, M.: A unified method for handling discrete and continuous uncertainty in Bayesian stackelberg games. In: International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2012)"},{"key":"6_CR20","unstructured":"Zhang, C., Jiang, A.X., Short, M.B., Brantingham, J.P., Tambe, M.: Towards a game theoretic approach for defendingagainst crime diffusion. In: AAMAS (2014)"}],"container-title":["Lecture Notes in Computer Science","Engineering Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14484-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T16:52:03Z","timestamp":1690735923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14484-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319144832","9783319144849"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14484-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}