{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T02:50:33Z","timestamp":1777949433477,"version":"3.51.4"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T00:00:00Z","timestamp":1275955200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cent Eur J Oper Res"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s10100-010-0148-5","type":"journal-article","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T14:00:55Z","timestamp":1275919255000},"page":"589-603","source":"Crossref","is-referenced-by-count":12,"title":["Shield versus sword resource distribution in K-round duels"],"prefix":"10.1007","volume":"19","author":[{"given":"Kjell","family":"Hausken","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Levitin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,8]]},"reference":[{"key":"148_CR1","unstructured":"Anderson R (2001) Why information security is hard: an economic perspective. Presented at the 18th symposium on operating systems principles, October 21\u201324, Lake Louise, Alberta, Canada; also the 17th Annual Computer Security Applications Conference, December 10\u201314, New Orleans, Louisiana; http:\/\/www.cl.cam.ac.uk\/~rja14\/Papers\/econ.pdf"},{"key":"148_CR2","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1016\/j.ejor.2006.03.057","volume":"181","author":"N Azaiez","year":"2007","unstructured":"Azaiez N, Bier VM (2007) Optimal resource allocation for security in reliability systems. Eur J Oper Res 181: 773\u2013786","journal-title":"Eur J Oper Res"},{"key":"148_CR3","doi-asserted-by":"crossref","unstructured":"Bier VM, Abhichandani V (2002) Optimal allocation of resources for defense of simple series and parallel systems from determined adversaries. Proceedings of the engineering foundation conference on risk-based decision making in water resources X, Santa Barbara, CA: American Society of Civil Engineers","DOI":"10.1061\/40694(2003)5"},{"key":"148_CR4","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.ress.2004.06.003","volume":"87","author":"VM Bier","year":"2005","unstructured":"Bier VM, Nagaraj A, Abhichandani V (2005) Protection of simple series and parallel systems with components of different values. Reliab Eng Syst Safety 87: 315\u2013323","journal-title":"Reliab Eng Syst Safety"},{"issue":"4","key":"148_CR5","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1111\/j.1467-9779.2007.00320.x","volume":"9","author":"VM Bier","year":"2007","unstructured":"Bier VM, Oliveros S, Samuelson L (2007) Choosing what to protect: strategic defense allocation against an unknown attacker. J Public Econ Theory 9(4): 563\u2013587","journal-title":"J Public Econ Theory"},{"key":"148_CR6","unstructured":"Clausewitz CV (1832, 1984) On war. Princeton University Press, Princeton"},{"key":"148_CR7","unstructured":"Dighe N, Zhuang J, Bier VM (2009) Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence, International Journal of Performability Engineering, special issue on system survivability and defense against external impacts 5(1):31\u201343"},{"key":"148_CR8","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1093\/ei\/cbh082","volume":"42","author":"K Hausken","year":"2004","unstructured":"Hausken K (2004) Mutual raiding and the emergence of exchange. Econ Inquiry 42: 572\u2013586","journal-title":"Econ Inquiry"},{"issue":"1","key":"148_CR9","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TR.2006.884599","volume":"56","author":"G Levitin","year":"2007","unstructured":"Levitin G (2007) Optimal defense strategy against intentional attacks. IEEE Trans Reliab 56(1): 148\u2013156","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"148_CR10","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1061\/(ASCE)1076-0342(2006)12:4(230)","volume":"12","author":"D Michaud","year":"2006","unstructured":"Michaud D, Apostolakis G (2006) Methodology for ranking the elements of water-supply networks. J Infrastruct Syst 12(4): 230\u2013242","journal-title":"J Infrastruct Syst"},{"issue":"9","key":"148_CR11","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1016\/j.ress.2006.08.004","volume":"92","author":"S Patterson","year":"2007","unstructured":"Patterson S, Apostolakis G (2007) Identification of critical locations across multiple infrastructures for terrorist actions. Reliab Eng Syst Safety 92(9): 1183\u20131203","journal-title":"Reliab Eng Syst Safety"},{"key":"148_CR12","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","volume":"7","author":"S Skaperdas","year":"1996","unstructured":"Skaperdas S (1996) Contest success functions. Econ Theory 7: 283\u2013290","journal-title":"Econ Theory"},{"key":"148_CR13","first-page":"97","volume-title":"Toward a theory of the rent-seeking society","author":"G Tullock","year":"1980","unstructured":"Tullock G (1980) Efficient Rent-Seeking. In: Buchanan JM, Tollison RD, Tullock G (eds) Toward a theory of the rent-seeking society. Texas A. & M. University Press, College Station, pp 97\u2013112"},{"issue":"5","key":"148_CR14","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","volume":"55","author":"J Zhuang","year":"2007","unstructured":"Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters\u2014defensive strategy with endogenous attacker effort. Oper Res 55(5): 976\u2013991","journal-title":"Oper Res"}],"container-title":["Central European Journal of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10100-010-0148-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10100-010-0148-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10100-010-0148-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T22:06:29Z","timestamp":1559167589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10100-010-0148-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,8]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["148"],"URL":"https:\/\/doi.org\/10.1007\/s10100-010-0148-5","relation":{},"ISSN":["1435-246X","1613-9178"],"issn-type":[{"value":"1435-246X","type":"print"},{"value":"1613-9178","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,8]]}}}