{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:42:05Z","timestamp":1740109325435,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T00:00:00Z","timestamp":1461974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003549","name":"Orsz\u00e1gos Tudom\u00e1nyos Kutat\u00e1si Alapprogramok (HU)","doi-asserted-by":"publisher","award":["OTKA 185101"],"award-info":[{"award-number":["OTKA 185101"]}],"id":[{"id":"10.13039\/501100003549","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Math. Program."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s10107-016-1011-9","type":"journal-article","created":{"date-parts":[[2016,4,30]],"date-time":"2016-04-30T07:08:50Z","timestamp":1462000130000},"page":"347-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security games on matroids"],"prefix":"10.1007","volume":"161","author":[{"given":"D\u00e1vid","family":"Szeszl\u00e9r","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,30]]},"reference":[{"key":"1011_CR1","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Ba\u015far, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press, New York (2010)","DOI":"10.1017\/CBO9780511760778"},{"issue":"3","key":"1011_CR2","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1145\/3828.3829","volume":"32","author":"WH Cunningham","year":"1985","unstructured":"Cunningham, W.H.: Optimal attack and reinforcement of a network. J. ACM (JACM) 32(3), 549\u2013561 (1985)","journal-title":"J. ACM (JACM)"},{"issue":"2","key":"1011_CR3","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/0095-8956(84)90023-6","volume":"36","author":"WH Cunningham","year":"1984","unstructured":"Cunningham, W.H.: Testing membership in matroid polyhedra. J. Comb. Theory Ser. B 36(2), 161\u2013188 (1984)","journal-title":"J. Comb. Theory Ser. B"},{"key":"1011_CR4","doi-asserted-by":"crossref","unstructured":"Gueye, A., Walrand, J.C., Anantharam, V.: Design of network topology in an adversarial environment. In: Proceedings of the 1st International Conference on Decision and Game Theory for Security, GameSec10, Berlin, Germany, pp. 1\u201320 (2010)","DOI":"10.1007\/978-3-642-17197-0_1"},{"key":"1011_CR5","doi-asserted-by":"crossref","unstructured":"Gueye, A., Walrand, J.C., Anantharam, V.: A network topology design game: how to choose communication links in an adversarial environment. In: Proceedings of the 2nd International ICST Conference on Game Theory for Networks, GameNets, vol. 11 (2011)","DOI":"10.1007\/978-3-642-30373-9_17"},{"issue":"2","key":"1011_CR6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0020-0190(83)90031-5","volume":"16","author":"D Gusfield","year":"1983","unstructured":"Gusfield, D.: Connectivity and edge-disjoint spanning trees. Inf. Process. Lett. 16(2), 87\u201389 (1983)","journal-title":"Inf. Process. Lett."},{"key":"1011_CR7","doi-asserted-by":"crossref","unstructured":"Han, Z.: Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press, New York (2012)","DOI":"10.1017\/CBO9780511895043"},{"key":"1011_CR8","unstructured":"Laszka, A., Szeszl\u00e9r, D.: Hide and seek in digital communication: the steganography game. In: Proceedings of the 9th Hungarian\u2013Japanese Symposium on Discrete Mathematics and its Applications, Fukuoka, Japan, pp. 126\u2013136 (2015)"},{"issue":"16","key":"1011_CR9","doi-asserted-by":"crossref","first-page":"3047","DOI":"10.1016\/j.gaceta.2008.07.003","volume":"52","author":"R Machado","year":"2008","unstructured":"Machado, R., Tekinay, S.: A survey of game-theoretic approaches in wireless sensor networks. Comput. Netw. 52(16), 3047\u20133061 (2008)","journal-title":"Comput. Netw."},{"key":"1011_CR10","doi-asserted-by":"crossref","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bacsar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput Surv (CSUR). vol. 45.3, Article No. 25 (2013)","DOI":"10.1145\/2480741.2480742"},{"key":"1011_CR11","unstructured":"Matou\u0161ek, J., G\u00e4rtner, B.: Understanding and Using Linear Programming, 226 p. Springer, Berlin (2007)"},{"issue":"1","key":"1011_CR12","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/BF01448847","volume":"100","author":"Jv Neumann","year":"1928","unstructured":"Neumann, Jv: Zur Theorie der Gesellschaftsspiele. Math. Ann. 100(1), 295\u2013320 (1928)","journal-title":"Math. Ann."},{"key":"1011_CR13","unstructured":"Schrijver, A.: Combinatorial Optimization: Polyhedra and Efficiency, Algorithms and Combinatorics, vol. 24, 1879 p. Springer, Berlin (2003)"},{"key":"1011_CR14","volume-title":"Security and game theory: algorithms, deployed systems, lessons learned","author":"M Tambe","year":"2012","unstructured":"Tambe, M.: Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, New York (2012)"}],"container-title":["Mathematical Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10107-016-1011-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10107-016-1011-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10107-016-1011-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10107-016-1011-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T10:23:35Z","timestamp":1655634215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10107-016-1011-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,30]]},"references-count":14,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["1011"],"URL":"https:\/\/doi.org\/10.1007\/s10107-016-1011-9","relation":{},"ISSN":["0025-5610","1436-4646"],"issn-type":[{"type":"print","value":"0025-5610"},{"type":"electronic","value":"1436-4646"}],"subject":[],"published":{"date-parts":[[2016,4,30]]}}}