{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:48:42Z","timestamp":1762001322643,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687100"},{"type":"electronic","value":"9783319687117"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68711-7_24","type":"book-chapter","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T08:23:40Z","timestamp":1507105420000},"page":"458-477","source":"Crossref","is-referenced-by-count":15,"title":["Optimal Patrol Planning for Green Security Games with Black-Box Attackers"],"prefix":"10.1007","author":[{"given":"Haifeng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Bistra","family":"Dilkina","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Plumptre","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Driciru","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Wanyama","sequence":"additional","affiliation":[]},{"given":"Aggrey","family":"Rwetsiba","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Nsubaga","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Mabonga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Critchlow, R., Plumptre, A.J., Alidria, B., Nsubuga, M., Driciru, M., Rwetsiba, A., Wanyama, F., Beale, C.M.: Improving law-enforcement effectiveness and efficiency in protected areas using ranger-collected monitoring data. Conserv. Lett. (2016). https:\/\/doi.org\/10.1111\/conl.12288 . ISSN 1755-263X","DOI":"10.1111\/conl.12288"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning. ICML (2006)","DOI":"10.1145\/1143844.1143874"},{"issue":"4","key":"24_CR3","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1111\/cobi.12249","volume":"28","author":"M Marco Di","year":"2014","unstructured":"Di Marco, M., Boitani, L., Mallon, D., Hoffmann, M., Iacucci, A., Meijaard, E., Visconti, P., Schipper, J., Rondinini, C.: A retrospective evaluation of the global decline of carnivores and ungulates. Conserv. Biol. 28(4), 1109\u20131118 (2014)","journal-title":"Conserv. Biol."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Fang, F., Nguyen, T.H., Pickles, R., Lam, W.Y., Clements, G.R., An, B., Singh, A., Tambe, M., Lemieux, A.: Deploying PAWS: field optimization of the protection assistant for wildlife security. In: Twenty-Eighth IAAI Conference (2016)","DOI":"10.1002\/9781119376866.ch10"},{"key":"24_CR5","unstructured":"Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Gholami, S., Ford, B., Fang, F., Plumptre, A., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Nsubaga, M., Mabonga, J.: Taking it for a test drive: a hybrid spatio-temporal model for wildlife poaching prediction evaluated through a controlled field test. In: Proceedings of the European Conference on Machine Learning & Principles and Practice of Knowledge Discovery in Databases, ECML PKDD 2017 (2017)","DOI":"10.1007\/978-3-319-71273-4_24"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Haas, T.C., Ferreira, S.M.: Optimal patrol routes: interdicting and pursuing rhino poachers. Police Pract. Res. 1\u201322 (2017). Routledge","DOI":"10.1080\/15614263.2017.1295243"},{"key":"24_CR8","unstructured":"Haghtalab, N., Fang, F., Nguyen, T.H., Sinha, A., Procaccia, A.D., Tambe, M.: Three strategies to success: learning adversary models in security games. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp. 308\u2013314. AAAI Press (2016)"},{"key":"24_CR9","unstructured":"Kar, D., Ford, B., Gholami, S., Fang, F., Plumptre, A., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Nsubaga, M., Mabonga, J.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2017, pp. 159\u2013167 (2017)"},{"key":"24_CR10","unstructured":"Moreto, W.: To conserve and protect: Examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda. Ph.D. thesis, Rutgers University-Graduate School-Newark (2013)"},{"key":"24_CR11","unstructured":"Nguyen, T.H., Sinha, A., Gholami, S., Plumptre, A., Joppa, L., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Critchlow, R., et al.: Capture: a new predictive anti-poaching tool for wildlife protection. In: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, pp. 767\u2013775. International Foundation for Autonomous Agents and Multiagent Systems (2016)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: AAAI (2013)","DOI":"10.1609\/aaai.v27i1.8599"},{"issue":"6","key":"24_CR13","first-page":"163","volume":"4","author":"VR Nyirenda","year":"2012","unstructured":"Nyirenda, V.R., Chomba, C.: Field foot patrol effectiveness in Kafue national park, Zambia. J. Ecol. Nat. Environ. 4(6), 163\u2013172 (2012)","journal-title":"J. Ecol. Nat. Environ."},{"issue":"1","key":"24_CR14","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TSMCA.2009.2029559","volume":"40","author":"C Seiffert","year":"2010","unstructured":"Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J., Napolitano, A.: Rusboost: a hybrid approach to alleviating class imbalance. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(1), 185\u2013197 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."},{"key":"24_CR15","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: a deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13\u201320. International Foundation for Autonomous Agents and Multiagent Systems (2012)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Singh, M., Vishnoi, N.K.: Entropy, optimization and counting. In: STOC, pp. 50\u201359. ACM (2014)","DOI":"10.1145\/2591796.2591803"},{"key":"24_CR17","volume-title":"Integer programming","author":"LA Wolsey","year":"1998","unstructured":"Wolsey, L.A.: Integer programming. Wiley-Interscience, New York (1998)"},{"key":"24_CR18","unstructured":"Xu, H., Tambe, M., Dughmi, S., Noronha, V.L.: The curse of correlation in security games and principle of max-entropy. CoRR abs\/1703.03912 (2017)"},{"key":"24_CR19","unstructured":"Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 453\u2013460. International Foundation for Autonomous Agents and Multiagent Systems (2014)"},{"issue":"4","key":"24_CR20","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1609\/aimag.v33i4.2432","volume":"33","author":"Z Yin","year":"2012","unstructured":"Yin, Z., Jiang, A.X., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., Sullivan, J.P.: Trusts: scheduling randomized patrols for fare inspection in transit systems using game theory. AI Mag. 33(4), 59 (2012)","journal-title":"AI Mag."}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68711-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T22:39:59Z","timestamp":1659566399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68711-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687100","9783319687117"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68711-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}