{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:38:41Z","timestamp":1777952321057,"version":"3.51.4"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["National Science Foundation (Grant No.1901721)"],"award-info":[{"award-number":["National Science Foundation (Grant No.1901721)"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005289","name":"National Institute of Justice","doi-asserted-by":"publisher","award":["2018-R2-CX-0011"],"award-info":[{"award-number":["2018-R2-CX-0011"]}],"id":[{"id":"10.13039\/100005289","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s10479-022-05064-w","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T20:23:06Z","timestamp":1668198186000},"page":"493-507","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A decomposable resource allocation model with generalized overarching protections"],"prefix":"10.1007","volume":"320","author":[{"given":"Abdolmajid","family":"Yolmeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2341-2326","authenticated-orcid":false,"given":"Melike","family":"Baykal-G\u00fcrsoy","sequence":"additional","affiliation":[]},{"given":"Vicki","family":"Bier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"issue":"3","key":"5064_CR1","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1111\/j.1539-6924.2008.01053.x","volume":"28","author":"VM Bier","year":"2008","unstructured":"Bier, V. M., Haphuriwat, N., Menoyo, J., Zimmerman, R., & Culpen, A. M. (2008). Optimal resource allocation for defense of targets based on differing measures of attractiveness. Risk Analysis: An International Journal, 28(3), 763\u2013770.","journal-title":"Risk Analysis: An International Journal"},{"key":"5064_CR2","doi-asserted-by":"crossref","unstructured":"Boyd, S., Boyd, S. P., & Vandenberghe, L. (2004) Convex optimization. Cambridge University Press, Ex. 5.32.","DOI":"10.1017\/CBO9780511804441"},{"issue":"6","key":"5064_CR3","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmer\u00f3n, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530\u2013544.","journal-title":"Interfaces"},{"issue":"1\u20133","key":"5064_CR4","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/BF01581153","volume":"66","author":"R Fletcher","year":"1994","unstructured":"Fletcher, R., & Leyffer, S. (1994). Solving mixed integer nonlinear programs by outer approximation. Mathematical Programming, 66(1\u20133), 327\u2013349.","journal-title":"Mathematical Programming"},{"issue":"4","key":"5064_CR5","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1111\/j.1539-6924.2010.01531.x","volume":"31","author":"M Golalikhani","year":"2011","unstructured":"Golalikhani, M., & Zhuang, J. (2011). Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers. Risk Analysis: An International Journal, 31(4), 533\u2013547.","journal-title":"Risk Analysis: An International Journal"},{"key":"5064_CR6","unstructured":"Hao, M., Jin, S., & Zhuang, J. (2009) Robustness of optimal defensive resource allocations in the face of less fully rational attacker. In IIE annual conference. Proceedings (p. 886). Institute of Industrial and Systems Engineers (IISE)."},{"issue":"1","key":"5064_CR7","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.ejor.2011.03.035","volume":"213","author":"N Haphuriwat","year":"2011","unstructured":"Haphuriwat, N., & Bier, V. M. (2011). Trade-offs between target hardening and overarching protection. European Journal of Operational Research, 213(1), 320\u2013328.","journal-title":"European Journal of Operational Research"},{"issue":"02","key":"5064_CR8","doi-asserted-by":"publisher","first-page":"1250056","DOI":"10.1142\/S021759591250056X","volume":"30","author":"K Hausken","year":"2013","unstructured":"Hausken, K. (2013). Combined series and parallel systems subject to individual versus overarching defense and attack. Asia-Pacific Journal of Operational Research, 30(02), 1250056.","journal-title":"Asia-Pacific Journal of Operational Research"},{"issue":"1","key":"5064_CR9","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10100-012-0271-6","volume":"22","author":"K Hausken","year":"2014","unstructured":"Hausken, K. (2014). Individual versus overarching protection and attack of assets. Central European Journal of Operations Research, 22(1), 89\u2013112.","journal-title":"Central European Journal of Operations Research"},{"key":"5064_CR10","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.ress.2017.03.027","volume":"165","author":"K Hausken","year":"2017","unstructured":"Hausken, K. (2017). Special versus general protection and attack of parallel and series components. Reliability Engineering & System Safety, 165, 239\u2013256.","journal-title":"Reliability Engineering & System Safety"},{"issue":"4","key":"5064_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.37190\/ord190404","volume":"29","author":"K Hausken","year":"2019","unstructured":"Hausken, K. (2019). Special versus general protection and attack of two assets. Operations Research and Decisions, 29(4), 53\u201393.","journal-title":"Operations Research and Decisions"},{"issue":"4","key":"5064_CR12","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","volume":"8","author":"K Hausken","year":"2012","unstructured":"Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355\u2013366.","journal-title":"International Journal of Performability Engineering"},{"issue":"7","key":"5064_CR13","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1057\/jors.2011.96","volume":"63","author":"G Levitin","year":"2012","unstructured":"Levitin, G., & Hausken, K. (2012). Individual versus overarching protection against strategic attacks. Journal of the Operational Research Society, 63(7), 969\u2013981.","journal-title":"Journal of the Operational Research Society"},{"key":"5064_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.ress.2013.05.024","volume":"119","author":"G Levitin","year":"2013","unstructured":"Levitin, G., Hausken, K., & Dai, Y. (2013). Individual vs. overarching protection for minimizing the expected damage caused by an attack. Reliability Engineering & System Safety, 119, 117\u2013125.","journal-title":"Reliability Engineering & System Safety"},{"key":"5064_CR15","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.ress.2013.11.001","volume":"123","author":"G Levitin","year":"2014","unstructured":"Levitin, G., Hausken, K., & Dai, Y. (2014). Optimal defense with variable number of overarching and individual protections. Reliability Engineering & System Safety, 123, 81\u201390.","journal-title":"Reliability Engineering & System Safety"},{"issue":"3","key":"5064_CR16","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/16843703.2014.11673350","volume":"11","author":"R Peng","year":"2014","unstructured":"Peng, R., Guo, L., Levitin, G., Mo, H., & Wang, W. (2014). Maintenance versus individual and overarching protections for parallel systems. Quality Technology & Quantitative Management, 11(3), 353\u2013362.","journal-title":"Quality Technology & Quantitative Management"},{"issue":"3","key":"5064_CR17","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1017\/S0003055407070244","volume":"101","author":"R Powell","year":"2007","unstructured":"Powell, R. (2007). Defending against terrorist attacks with limited resources. American Political Science Review, 101(3), 527\u2013541.","journal-title":"American Political Science Review"},{"issue":"3","key":"5064_CR18","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1007\/s11069-017-3033-x","volume":"89","author":"D Seaberg","year":"2017","unstructured":"Seaberg, D., Devine, L., & Zhuang, J. (2017). A review of game theory applications in natural disaster management research. Natural Hazards, 89(3), 1461\u20131483.","journal-title":"Natural Hazards"},{"issue":"4","key":"5064_CR19","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1287\/deca.1110.0218","volume":"8","author":"C Wang","year":"2011","unstructured":"Wang, C., & Bier, V. M. (2011). Target-hardening decisions based on uncertain multiattribute terrorist utility. Decision Analysis, 8(4), 286\u2013302.","journal-title":"Decision Analysis"},{"issue":"1","key":"5064_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1287\/deca.2018.0377","volume":"16","author":"A Yolmeh","year":"2019","unstructured":"Yolmeh, A., & Baykal-G\u00fcrsoy, M. (2019). Two-stage invest-defend game: Balancing strategic and operational decisions. Decision Analysis, 16(1), 46\u201366.","journal-title":"Decision Analysis"},{"issue":"5","key":"5064_CR21","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1287\/opre.1070.0434","volume":"55","author":"J Zhuang","year":"2007","unstructured":"Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976\u2013991.","journal-title":"Operations Research"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-022-05064-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10479-022-05064-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-022-05064-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:54:48Z","timestamp":1728348888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10479-022-05064-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["5064"],"URL":"https:\/\/doi.org\/10.1007\/s10479-022-05064-w","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,11]]},"assertion":[{"value":"26 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}