{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:22:22Z","timestamp":1725837742468},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255934"},{"type":"electronic","value":"9783319255941"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_10","type":"book-chapter","created":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T21:03:13Z","timestamp":1447189393000},"page":"170-191","source":"Crossref","is-referenced-by-count":9,"title":["Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games"],"prefix":"10.1007","author":[{"given":"Thanh H.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Francesco M. Delle","family":"Fave","sequence":"additional","affiliation":[]},{"given":"Debarun","family":"Kar","sequence":"additional","affiliation":[]},{"given":"Aravind S.","family":"Lakshminarayanan","sequence":"additional","affiliation":[]},{"given":"Amulya","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]},{"given":"Noa","family":"Agmon","sequence":"additional","affiliation":[]},{"given":"Andrew J.","family":"Plumptre","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Driciru","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Wanyama","sequence":"additional","affiliation":[]},{"given":"Aggrey","family":"Rwetsiba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"10_CR1","unstructured":"Basilico, N., Gatti, N., Amigoni, F.: Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In: AAMAS (2009)"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1016\/j.artint.2006.02.003","volume":"170","author":"C Boutilier","year":"2006","unstructured":"Boutilier, C., Patrascu, R., Poupart, P., Schuurmans, D.: Constraint-based optimization and utility elicitation using the minimax decision criterion. Artif. Intell. 170, 686\u2013713 (2006)","journal-title":"Artif. Intell."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Braziunas, D., Boutilier, C.: Assessing regret-based preference elicitation with the utpref recommendation system. In: EC (2010)","DOI":"10.1145\/1807342.1807377"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Brown, M., Haskell, W.B., Tambe, M.: Addressing scalability and robustness in security games with multiple boundedly rational adversaries. In: GameSec (2014)","DOI":"10.1007\/978-3-319-12601-2_2"},{"key":"10_CR5","volume-title":"The Conceptual Framework of Psychology","author":"E Brunswik","year":"1952","unstructured":"Brunswik, E.: The Conceptual Framework of Psychology. University of Chicago Press, New York (1952)"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1287\/moor.1040.0094","volume":"29","author":"DP Farias De","year":"2004","unstructured":"De Farias, D.P., Van Roy, B.: On constraint sampling in the linear programming approach to approximate dynamic programming. Math. Oper. Res. 29, 462\u2013478 (2004)","journal-title":"Math. Oper. Res."},{"key":"10_CR7","unstructured":"Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: IJCAI (2015)"},{"key":"10_CR8","volume-title":"Decision Theory: An Introduction to the Mathematics of Rationality","author":"S French","year":"1986","unstructured":"French, S.: Decision Theory: An Introduction to the Mathematics of Rationality. Halsted Press, New York (1986)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Haskell, W.B., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, L.E.: Robust protection of fisheries with compass. In: IAAI (2014)","DOI":"10.1609\/aaai.v28i2.19018"},{"key":"10_CR10","unstructured":"Kiekintveld, C., Islam, T., Kreinovich, V.: Security games with interval uncertainty. In: AAMAS (2013)"},{"key":"10_CR11","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: AAMAS (2009)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., Parr, R.: Complexity of computing optimal stackelberg strategies in security resource allocation games. In: AAAI (2010)","DOI":"10.1609\/aaai.v24i1.7638"},{"key":"10_CR13","unstructured":"Letchford, J., Vorobeychik, Y.: Computing randomized security strategies in networked domains. In: AARM (2011)"},{"key":"10_CR14","unstructured":"McFadden, D.: Conditional logit analysis of qualitative choice behavior. Technical report (1972)"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1006\/game.1995.1023","volume":"10","author":"R McKelvey","year":"1995","unstructured":"McKelvey, R., Palfrey, T.: Quantal response equilibria for normal form games. Game Econ. Behav. 10(1), 6\u201338 (1995)","journal-title":"Game Econ. Behav."},{"key":"10_CR16","unstructured":"Montesh, M.: Rhino poaching: a new form of organised crime1. University of South Africa, Technical report (2013)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Yadav, A., An, B., Tambe, M., Boutilier, C.: Regret-based optimization and preference elicitation for stackelberg security games with uncertainty. In: AAAI (2014)","DOI":"10.1609\/aaai.v28i1.8804"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: AAAI (2013)","DOI":"10.1609\/aaai.v27i1.8599"},{"key":"10_CR19","unstructured":"Nudelman, E., Wortman, J., Shoham, Y., Leyton-Brown, K.: Run the gamut: a comprehensive approach to evaluating game-theoretic algorithms. In: AAMAS (2004)"},{"key":"10_CR20","unstructured":"Pita, J., Jain, M., Tambe, O.M., Kraus, S., Magori-cohen, R.: Effective solutions for real-world stackelberg games: when agents must deal with human uncertainties. In: AAMAS (2009)"},{"key":"10_CR21","unstructured":"Qian, Y., Haskell, W.B., Jiang, A.X., Tambe, M.: Online planning for optimal protector strategies in resource conservation games. In: AAMAS (2014)"},{"key":"10_CR22","unstructured":"Secretariat, G.: Global tiger recovery program implementation plan: 2013\u201314. Report, The World Bank, Washington, DC (2013)"},{"key":"10_CR23","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: a deployed game theoretic system to protect the ports of the united states. In: AAMAS (2012)"},{"key":"10_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems. Cambridge University Press, Lessons Learned (2011)"},{"key":"10_CR25","volume-title":"Applying Contemporary Statistical Techniques","author":"R Wilcox","year":"2002","unstructured":"Wilcox, R.: Applying Contemporary Statistical Techniques. Academic Press, New York (2002)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Wright, J.R., Leyton-Brown, K.: Level-0 meta-models for predicting human behavior in games. In: ACM-EC, pp. 857\u2013874 (2014)","DOI":"10.1145\/2600057.2602907"},{"key":"10_CR27","unstructured":"Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: AAMAS (2014)"},{"key":"10_CR28","unstructured":"Yang, R., Ordonez, F., Tambe, M.: Computing optimal strategy against quantal response in security games. In: AAMAS (2012)"},{"key":"10_CR29","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1609\/aimag.v33i4.2432","volume":"33","author":"Z Yin","year":"2012","unstructured":"Yin, Z., Jiang, A.X., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.P.: Trusts: scheduling randomized patrols for fare inspection in transit systems using game theory. AI Mag. 33, 59 (2012)","journal-title":"AI Mag."},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness. In: AAMAS (2010)","DOI":"10.1613\/jair.3269"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T16:30:28Z","timestamp":1692117028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}