{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T05:00:17Z","timestamp":1772600417509,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,11,11]],"date-time":"2012-11-11T00:00:00Z","timestamp":1352592000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s10458-012-9209-6","type":"journal-article","created":{"date-parts":[[2012,11,10]],"date-time":"2012-11-10T09:27:08Z","timestamp":1352539628000},"page":"31-71","source":"Crossref","is-referenced-by-count":14,"title":["An extended study on multi-objective security games"],"prefix":"10.1007","volume":"28","author":[{"given":"Matthew","family":"Brown","sequence":"first","affiliation":[]},{"given":"Bo","family":"An","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kiekintveld","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Ord\u00f3\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,11]]},"reference":[{"issue":"4","key":"9209_CR1","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1109\/TPWRS.2003.818693","volume":"18","author":"M. Abido","year":"2003","unstructured":"Abido M. (2003) Environmental\/economic power dispatch using multiobjective evolutionary algorithms. IEEE Transactions on Power Systems 18(4): 1529\u20131537","journal-title":"IEEE Transactions on Power Systems"},{"issue":"1","key":"9209_CR2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.ejor.2006.02.033","volume":"180","author":"M. J. Alves","year":"2007","unstructured":"Alves M. J., Clmaco J. (2007) A review of interactive methods for multiobjective integer and mixed-integer programming. European Journal of Operational Research 180(1): 99\u2013115","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"9209_CR3","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1978721.1978729","volume":"10","author":"B. An","year":"2011","unstructured":"An B., Pita J., Shieh E., Tambe M., Kiekintveld C., Marecki J. (2011) GUARDS and PROTECT: Next generation applications of security games. ACM SIGecom Exchanges 10(1): 31\u201334","journal-title":"ACM SIGecom Exchanges"},{"key":"9209_CR4","unstructured":"Basilico, N., Gatti, N., & Amigoni, F. (2009). Leader\u2013follower strategies for robotic patrolling in environments with arbitrary topologies. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (pp. 57\u201364)."},{"issue":"3","key":"9209_CR5","doi-asserted-by":"crossref","first-page":"183","DOI":"10.3846\/1648-4142.2008.23.183-193","volume":"23","author":"W. Brauers","year":"2008","unstructured":"Brauers W., Zavadskas E., Peldschus F., Turskis Z. (2008) Multi-objective decision-making for road design. Transport 23(3): 183\u2013193","journal-title":"Transport"},{"key":"9209_CR6","unstructured":"Bringmann, K., Friedrich, T., Neumann, F., & Wagner, M. (2011). Approximation-guided evolutionary multi-objective optimization. In International Joint Conference on Artificial Intelligence (IJCAI) (pp. 1198\u20131203)."},{"key":"9209_CR7","unstructured":"Brown, M., An, B., Kiekintveld, C., Ordonez, F., & Tambe, M. (2012). Multi-objective optimization for security games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS)."},{"key":"9209_CR8","volume-title":"Multiobjective decision making: Theory and methodology","author":"V. Chankong","year":"1983","unstructured":"Chankong V., Haimes Y. (1983) Multiobjective decision making: Theory and methodology. North-Holland, New York"},{"key":"9209_CR9","unstructured":"Coello, C., Lamont, G., & Van Veldhuizen, D. (2007). Evolutionary algorithms for solving multi-objective problems (Vol. 5). Genetic and Evolutionary Computation. Springer"},{"key":"9209_CR10","doi-asserted-by":"crossref","unstructured":"Conitzer, V., & Korzhyk, D. (2011). Commitment to correlated strategies. In International Joint Conference on Artificial Intelligence (IJCAI) (pp. 632\u2013637).","DOI":"10.1609\/aaai.v25i1.7875"},{"key":"9209_CR11","doi-asserted-by":"crossref","unstructured":"Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In ACM Conference on Electronic Commerce (pp. 82\u201390).","DOI":"10.1145\/1134707.1134717"},{"key":"9209_CR12","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"K. Deb","year":"2001","unstructured":"Deb K. (2001) Multi-objective optimization using evolutionary algorithms. Wiley, Chichester"},{"issue":"2","key":"9209_CR13","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K. Deb","year":"2002","unstructured":"Deb K., Pratap A., Agarwal S., Meyarivan T. (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation 6(2): 182\u2013197","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"9209_CR14","first-page":"107","volume":"8","author":"M. Giuliano","year":"2008","unstructured":"Giuliano M., Johnston M. (2008) Multi-objective evolutionary algorithms for scheduling the James Webb space telescope. International Conference on Automated Planning and Scheduling (ICAPS) 8: 107\u2013115","journal-title":"International Conference on Automated Planning and Scheduling (ICAPS)"},{"issue":"3","key":"9209_CR15","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/TSMC.1971.4308298","volume":"1","author":"Y. Haimes","year":"1971","unstructured":"Haimes Y., Lasdon L., Wismer D. (1971) On a bicriterion formulation of the problems of integrated system identification and system optimization. IEEE Transactions on Systems, Man, and Cybernetics 1(3): 296\u2013297","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"9209_CR16","doi-asserted-by":"crossref","unstructured":"Hwang, C., & Masud, A. (1979). Multiple objective decision making, methods and applications: A state-of-the-art survey (Vol. 164). Lecture Notes in Economics and Mathematical Systems. Springer","DOI":"10.1007\/978-3-642-45511-7_3"},{"key":"9209_CR17","unstructured":"Inselberg, A. (1997). Parallel coordinates for visualizing multidimensional geometry. New Techniques and Technologies for Statistics II: Proceedings of the second Bonn Seminar 279\u2013288."},{"key":"9209_CR18","unstructured":"Iseki, H., Demisch, A., Taylor, B., & Yoh, A. (2008). Evaluating the costs and benefits of transit smart cards. California PATH Research Report. Institute of Transportation Studies, University of California at Berkeley."},{"key":"9209_CR19","unstructured":"Jain, M., Leyton-Brown, K., & Tambe, M. (2012). Where the hard security problems are? In AAAI Spring Symposium."},{"key":"9209_CR20","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1287\/inte.1100.0505","volume":"40","author":"M. Jain","year":"2010","unstructured":"Jain M., Tsai J., Pita J., Kiekintveld C., Rathi S., Tambe M., Ordonez F. (2010) Software assistants for randomized patrol planning for the LAX Airport Police and the Federal Air Marshals Service. Interfaces 40: 267\u2013290","journal-title":"Interfaces"},{"key":"9209_CR21","unstructured":"Jolliffe, I. (2002). Principal component analysis. Springer"},{"key":"9209_CR22","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordonez, F., & Tambe, M. (2009). Computing optimal randomized resource allocations for massive security games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (pp. 689\u2013696)."},{"key":"9209_CR23","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s00158-004-0465-1","volume":"29","author":"I. Kim","year":"2005","unstructured":"Kim I., de Weck O. (2005) Adaptive weighted-sum method for bi-objective optimization: Pareto front generation. Structural and Multidisciplinary Optimization 29: 149\u2013158","journal-title":"Structural and Multidisciplinary Optimization"},{"key":"9209_CR24","unstructured":"Korzhyk, D., Conitzer, V., & Parr, R. (2011). Security games with multiple attacker resources. In International Joint Conference on Artificial Intelligence (IJCAI) (pp. 273\u2013279)."},{"key":"9209_CR25","first-page":"443","volume":"1","author":"S. Kukkonen","year":"2005","unstructured":"Kukkonen S., Lampinen J. (2005) GDE3: The third evolution step of generalized differential evolution. IEEE Congress on Evolutionary Computation 1: 443\u2013450","journal-title":"IEEE Congress on Evolutionary Computation"},{"issue":"3","key":"9209_CR26","doi-asserted-by":"crossref","first-page":"932","DOI":"10.1016\/j.ejor.2004.08.029","volume":"169","author":"M. Laumanns","year":"2006","unstructured":"Laumanns M., Thiele L., Zitzler E. (2006) An efficient, adaptive parameter variation scheme for metaheuristics based on the epsilon-constraint method. European Journal of Operational Research 169(3): 932\u2013942","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"9209_CR27","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/S0377-2217(98)00018-6","volume":"117","author":"D. Li","year":"1999","unstructured":"Li D., Yang J., Biswal M. (1999) Quantitative parametric connections between methods for generating noninferior solutions in multiobjective optimization. European Journal of Operational Research 117(1): 84\u201399","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"9209_CR28","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCS.1981.1084969","volume":"28","author":"M. Lightner","year":"1981","unstructured":"Lightner M., Director S. (1981) Multiple criterion optimization for the design of electronic circuits. IEEE Transactions on Circuits and Systems 28(3): 169\u2013179","journal-title":"IEEE Transactions on Circuits and Systems"},{"key":"9209_CR29","unstructured":"Lotov, A., Bushenkov, V., & Kamenev, G. (2004). Interactive decision maps: Approximation and visualization of Pareto frontier (Vol. 89). Springer"},{"issue":"2","key":"9209_CR30","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.omega.2007.06.001","volume":"37","author":"M. Luque","year":"2009","unstructured":"Luque M., Miettinen K., Eskelinen P., Ruiz F. (2009) Incorporating preference information in interactive reference point methods for multiobjective optimization. Omega 37(2): 450\u2013462","journal-title":"Omega"},{"issue":"2","key":"9209_CR31","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.amc.2009.03.037","volume":"213","author":"G. Mavrotas","year":"2009","unstructured":"Mavrotas G. (2009) Effective implementation of the \u03b5-constraint method in multi-objective mathematical programming problems. Applied Mathematics and Computation 213(2): 455\u2013465","journal-title":"Applied Mathematics and Computation"},{"key":"9209_CR32","unstructured":"Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (pp. 895\u2013902)."},{"key":"9209_CR33","unstructured":"Pita, J., Jain, M., Ordez, F., Tambe, M., Kraus, S., & Magori-Cohen, R. (2009). Effective solutions for real-world stackelberg games: When agents must deal with human uncertainties. International Conference on Autonomous Agents and Multiagent Systems (AAMAS)."},{"issue":"4","key":"9209_CR34","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.rser.2003.12.007","volume":"8","author":"S. Pohekar","year":"2004","unstructured":"Pohekar S., Ramachandran M. (2004) Application of multi-criteria decision making to sustainable energy planning a review. Renewable and Sustainable Energy Reviews 8(4): 365\u2013381","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"9209_CR35","volume-title":"Multiple criteria optimization: Theory, computation, and application","author":"R. E. Steuer","year":"1989","unstructured":"Steuer R. E. (1989) Multiple criteria optimization: Theory, computation, and application. Robert E. Krieger Publishing Company, Malabar, FL"},{"issue":"7","key":"9209_CR36","doi-asserted-by":"crossref","first-page":"881","DOI":"10.2514\/2.7537","volume":"37","author":"R. Tappeta","year":"1999","unstructured":"Tappeta R., Renaud J. (1999) Interactive multiobjective optimization procedure. AIAA Journal 37(7): 881\u2013889","journal-title":"AIAA Journal"},{"issue":"6","key":"9209_CR37","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/S0360-5442(02)00009-9","volume":"27","author":"A. Toffolo","year":"2002","unstructured":"Toffolo A., Lazzaretto A. (2002) Evolutionary algorithms for multi-objective energetic and economic optimization in thermal system design. Energy 27(6): 549\u2013567","journal-title":"Energy"},{"key":"9209_CR38","unstructured":"van Wijk, J., & van Liere, R. (1993). Hyperslice: Visualization of scalar functions of many variables. In Visualization (pp. 119\u2013125). Washington, DC: IEEE Computer Society."},{"key":"9209_CR39","unstructured":"von Stengel, B., & Zamir, S. (2004). Leadership with commitment to mixed strategies. Technical Report LSE-CDAM-2004-01, CDAM Research Report."},{"key":"9209_CR40","unstructured":"Yang, R., Ordonez, F., & Tambe, M. (2012). Computing optimal strategy against quantal response in security games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS)."},{"issue":"1","key":"9209_CR41","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TAC.1963.1105511","volume":"8","author":"L. Zadeh","year":"1963","unstructured":"Zadeh L. (1963) Optimality and non-scalar-valued performance criteria. IEEE Transactions on Automatic Control 8(1): 59\u201360","journal-title":"IEEE Transactions on Automatic Control"},{"key":"9209_CR42","unstructured":"Zitzler, E., Laumanns, M., & Thiele, L. (2001). SPEA2: Improving the strength Pareto evolutionary algorithm. TIK-Report 103. Zurich: Swiss Federal Institute of Technology (ETH), Computer Engineering and Networks Engineering (TIK)."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-012-9209-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-012-9209-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-012-9209-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:31:31Z","timestamp":1687804291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-012-9209-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,11]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["9209"],"URL":"https:\/\/doi.org\/10.1007\/s10458-012-9209-6","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,11]]}}}