{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:22:20Z","timestamp":1725837740260},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255934"},{"type":"electronic","value":"9783319255941"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_7","type":"book-chapter","created":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T21:03:13Z","timestamp":1447189393000},"page":"113-129","source":"Crossref","is-referenced-by-count":1,"title":["Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games"],"prefix":"10.1007","author":[{"given":"Phillip","family":"Lee","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Basel","family":"Alomair","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Bushnell","sequence":"additional","affiliation":[]},{"given":"Radha","family":"Poovendran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"7_CR1","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, vol. 2, pp. 895\u2013902 (2008)"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 25 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR3","unstructured":"Pita, J., Jain, M., Marecki, J., Ord\u00f3\u00f1ez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles international airport. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems: Industrial Track, pp. 125\u2013132 (2008)"},{"key":"7_CR4","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: a deployed game theoretic system to protect the ports of the United States. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13\u201320 (2012)"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TIFS.2009.2019154","volume":"4","author":"L Chen","year":"2009","unstructured":"Chen, L., Leneutre, J.: A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4(2), 165\u2013178 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-02786-9_8","volume-title":"Decision and Game Theory for Security","author":"AX Jiang","year":"2013","unstructured":"Jiang, A.X., Nguyen, T.H., Tambe, M., Procaccia, A.D.: Monotonic maximin: a robust stackelberg solution against boundedly rational followers. In: Das, S.K., Nita-Rotaru, C., Kantarcioglu, M. (eds.) GameSec 2013. LNCS, vol. 8252, pp. 119\u2013139. Springer, Heidelberg (2013)"},{"issue":"6","key":"7_CR7","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmer\u00f3n, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530\u2013544 (2006)","journal-title":"Interfaces"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TPDS.2013.211","volume":"25","author":"S Zonouz","year":"2014","unstructured":"Zonouz, S., Khurana, H., Sanders, W.H., Yardley, T.M.: Rre: a game-theoretic intrusion response and recovery engine. IEEE Trans. Parallel Distrib. Syst. 25(2), 395\u2013406 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.-P., Le Boudec, J.-Y.: Protecting location privacy: optimal strategy against localization attacks. Conf. Comput. Commun. Secure. 617\u2013627 (2012)","DOI":"10.1145\/2382196.2382261"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/popets-2015-0025","volume":"2015","author":"R Shokri","year":"2015","unstructured":"Shokri, R.: Privacy games: optimal user-centric data obfuscation. Proc. Priv. Enhancing Technol. 2015(2), 1\u201317 (2015)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"7_CR11","unstructured":"Yang, R., Ordonez, F., Tambe, M.: Computing optimal strategy against quantal response in security games. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 2, pp. 847\u2013854 (2012)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kiekintveld, C., Marecki, J., Tambe, M.: Approximation methods for infinite bayesian stackelberg games: modeling distributional payoff uncertainty. In: The 10th International Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1005\u20131012 (2011)","DOI":"10.1017\/CBO9780511973031.011"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1006\/game.1995.1023","volume":"10","author":"RD McKelvey","year":"1995","unstructured":"McKelvey, R.D., Palfrey, T.R.: Quantal response equilibria for normal form games. Games Econ. Behav. 10(1), 6\u201338 (1995)","journal-title":"Games Econ. Behav."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Agmon, N., Kraus, S., Kaminka, G. et al.: Multi-robot perimeter patrol in adversarial settings. In: International Conference on Robotics and Automation, pp. 2339\u20132345 (2008)","DOI":"10.1109\/ROBOT.2008.4543563"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Vorobeychik, Y., An, B., Tambe, M., Singh, S.: Computing solutions in infinite-horizon discounted adversarial patrolling games. In: International Conference on Automated Planning and Scheduling (2014)","DOI":"10.1609\/icaps.v24i1.13614"},{"key":"7_CR16","unstructured":"Varakantham, P., Lau, H.C., Yuan, Z.: Scalable randomized patrolling for securing rapid transit networks. In: Proceedings of the Twenty-Fifth Innovative Applications of Artificial Intelligence Conference"},{"key":"7_CR17","unstructured":"Khalil, H.K.: Nonlinear Systems. Prentice Hall Upper Saddle River (2002)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T16:30:23Z","timestamp":1692117023000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}