{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T04:42:35Z","timestamp":1777437755227,"version":"3.51.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319255934","type":"print"},{"value":"9783319255941","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_11","type":"book-chapter","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T02:03:13Z","timestamp":1447207393000},"page":"192-207","source":"Crossref","is-referenced-by-count":1,"title":["A Security Game Model for Environment Protection in the Presence of an Alarm System"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Basilico","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"De Nittis","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Gatti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"11_CR1","unstructured":"An, B., Brown, M., Vorobeychik, Y., Tambe, M.: Security games with surveillance cost and optimal timing of attack execution. In: AAMAS, pp. 223\u2013230 (2013)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.artint.2012.03.003","volume":"184\u2013185","author":"N Basilico","year":"2012","unstructured":"Basilico, N., Gatti, N., Amigoni, F.: Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder. Artif. Intell. 184\u2013185, 78\u2013123 (2012)","journal-title":"Artif. Intell."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Basilico, N., Gatti, N., Rossi, T.: Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games. In: IEEE Symposium on Computational Intelligence and Games, CIG 2009, pp. 186\u2013193, September 2009","DOI":"10.1109\/CIG.2009.5286477"},{"key":"11_CR4","unstructured":"Basilico, N., Carpin, S., Chung, T.: Distributed online patrolling with multi-agent teams of sentinels and searchers. In: DARS (2014)"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/S0097539792228289","volume":"23","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Goldwasser, S.: The complexity of decision versus search. SIAM J. Comput. 23(1), 97\u2013119 (1994)","journal-title":"SIAM J. Comput."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Blum, A., Haghtalab, N., Procaccia, A.D.: Lazy defenders are almost optimal against diligent attackers. In: AAAI, pp. 573\u2013579 (2014)","DOI":"10.1609\/aaai.v28i1.8799"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"B\u00f6ckenhauer, H.J., Forlizzi, L., Hromkovi\u010d, J., Kneis, J., Kupke, J., Proietti, G., Widmayer, P.: Reusing optimal tsp solutions for locally modified input instances. In: IFIP TCS, pp. 251\u2013270 (2006)","DOI":"10.1007\/978-0-387-34735-6_21"},{"key":"11_CR8","unstructured":"Munoz de Cote, E., Stranders, R., Basilico, N., Gatti, N., Jennings, N.: Introducing alarms in adversarial patrolling games. In: AAMAS, pp. 1275\u20131276 (2013)"},{"key":"11_CR9","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.4317","volume":"50","author":"FM Delle Fave","year":"2014","unstructured":"Delle Fave, F.M., Jiang, A., Yin, Z., Zhang, C., Tambe, M., Kraus, S., Sullivan, J.P.: Game-theoretic patrolling with dynamic execution uncertainty and a case study on a real transit system. JAIR 50, 321\u2013367 (2014)","journal-title":"JAIR"},{"key":"11_CR10","unstructured":"Ford, B.J., Kar, D., Fave, F.M.D., Yang, R., Tambe, M.: PAWS: adaptive game-theoretic patrolling for wildlife protection. In: International conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2014, Paris, France, 5\u20139 May 2014, pp. 1641\u20131642 (2014)"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.compag.2010.12.005","volume":"75","author":"AJ Garcia-Sanchez","year":"2011","unstructured":"Garcia-Sanchez, A.J., Garcia-Sanchez, F., Garcia-Haro, J.: Wireless sensor network deployment for integrating video-surveillance and data-monitoring in precision agriculture over distributed crops. Comput. Electron. Agric. 75(2), 288\u2013303 (2011)","journal-title":"Comput. Electron. Agric."},{"issue":"3","key":"11_CR12","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1609\/aimag.v33i3.2420","volume":"33","author":"M Jain","year":"2012","unstructured":"Jain, M., An, B., Tambe, M.: An overview of recent application trends at the AAMAS conference: security, sustainability, and safety. AI Mag. 33(3), 14\u201328 (2012)","journal-title":"AI Mag."},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1287\/inte.1100.0505","volume":"40","author":"M Jain","year":"2010","unstructured":"Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ord\u00f3\u00f1ez, F.: Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4), 267\u2013290 (2010)","journal-title":"Interfaces"},{"issue":"10","key":"11_CR14","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1016\/j.imavis.2013.08.001","volume":"31","author":"BC Ko","year":"2013","unstructured":"Ko, B.C., Park, J.O., Nam, J.Y.: Spatiotemporal bag-of-features for early wildfire smoke detection. Image Vis. Comput. 31(10), 786\u2013795 (2013)","journal-title":"Image Vis. Comput."},{"key":"11_CR15","volume-title":"An Introduction to Game Theory","author":"MJ Osborne","year":"2004","unstructured":"Osborne, M.J.: An Introduction to Game Theory, vol. 3. Oxford University Press, New York (2004)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Paruchuri, P., Tambe, M., Ord\u00f3\u00f1ez, F., Kraus, S.: Security in multiagent systems by policy randomization. In: AAMAS, pp. 273\u2013280 (2006)","DOI":"10.1145\/1160633.1160681"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/BF02022044","volume":"4","author":"MW Savelsbergh","year":"1985","unstructured":"Savelsbergh, M.W.: Local search in routing problems with time windows. Ann. Oper. Res. 4(1), 285\u2013305 (1985)","journal-title":"Ann. Oper. Res."},{"key":"11_CR18","unstructured":"Von Stengel, B., Zamir, S.: Leadership with commitment to mixed strategies (2004)"},{"key":"11_CR19","unstructured":"Vorobeychik, Y., An, B., Tambe, M., Singh, S.P.: Computing solutions in infinite-horizon discounted adversarial patrolling games. In: Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, ICAPS 2014, Portsmouth, New Hampshire, USA, 21\u201326 June 2014 (2014)"},{"key":"11_CR20","unstructured":"Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (2014)"},{"issue":"12","key":"11_CR21","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292\u20132330 (2008)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T20:30:25Z","timestamp":1692131425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}