{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T10:24:36Z","timestamp":1766312676932,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T00:00:00Z","timestamp":1499904000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T00:00:00Z","timestamp":1499904000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100006831","name":"U.S. Air Force","doi-asserted-by":"publisher","award":["n\/a"],"award-info":[{"award-number":["n\/a"]}],"id":[{"id":"10.13039\/100006831","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Heuristics"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10732-017-9350-0","type":"journal-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T07:49:53Z","timestamp":1499932193000},"page":"417-447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Heterogeneous surface-to-air missile defense battery location: a game theoretic approach"],"prefix":"10.1007","volume":"23","author":[{"given":"Nicholas T.","family":"Boardman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5191-4361","authenticated-orcid":false,"given":"Brian J.","family":"Lunday","sequence":"additional","affiliation":[]},{"given":"Matthew J.","family":"Robbins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,13]]},"reference":[{"issue":"6","key":"9350_CR1","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1287\/opre.1070.0440","volume":"55","author":"RK Ahuja","year":"2007","unstructured":"Ahuja, R.K., Kumar, A., Jha, K.C., Orlin, J.B.: Exact and heuristic algorithms for the weapon-target assignment problem. Oper. Res. 55(6), 1136\u20131146 (2007)","journal-title":"Oper. Res."},{"issue":"4","key":"9350_CR2","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1111\/j.1467-9779.2007.00320.x","volume":"9","author":"VM Bier","year":"2007","unstructured":"Bier, V.M., Oliveros, S., Samuelson, L.: Choosing what to protect: strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 9(4), 563\u2013587 (2007)","journal-title":"J. Public Econ. Theory"},{"key":"9350_CR3","unstructured":"Boardman, N.T.: Heterogeneous air defense battery location: a game theoretic approach. Master\u2019s thesis, Air Force Institute of Technology (2016)"},{"issue":"6","key":"9350_CR4","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmer\u00f3n, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530\u2013544 (2006)","journal-title":"Interfaces"},{"issue":"1","key":"9350_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1287\/trsc.17.1.48","volume":"17","author":"MS Daskin","year":"1983","unstructured":"Daskin, M.S.: A maximum expected covering location model: formulation, properties and heuristic solution. Transport. Sci. 17(1), 48\u201370 (1983)","journal-title":"Transport. Sci."},{"key":"9350_CR6","unstructured":"Foss, C.F., O\u2019Halloran, J.C.: IHS Jane\u2019s Land Warfare Platforms\u2014Artillery & Air Defense, vol. 16\/17. IHS Global Limited, London (2016) [ISBN 9780710632142]"},{"key":"9350_CR7","unstructured":"Freedberg Jr., S.J.: Save our Seoul: can lasers & rail guns protect Korea?. \n                    http:\/\/breakingdefense.com\/2015\/05\/save-our-seoul-can-lasers-rail-guns-protect-korea\/\n                    \n                   (2015). Accessed 12 May 2015"},{"key":"9350_CR8","unstructured":"Gady, F.: US and Japan successfully test ballistic missile killer. \n                    http:\/\/thediplomat.com\/2015\/06\/us-and-japan-successfully-test-ballistic-missile-killer\/\n                    \n                   (2015). Accessed 25 June 2015"},{"key":"9350_CR9","unstructured":"GlobalSecurity.org: Patriot Theater Missile Defense Deployment. \n                    http:\/\/www.globalsecurity.org\/space\/systems\/patriot-deploy.htm\n                    \n                   (2017). Accessed 15 Feb 2017"},{"issue":"5","key":"9350_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/0305-0548(86)90048-1","volume":"13","author":"F Glover","year":"1986","unstructured":"Glover, F.: Future paths for integer programming and links to artificial intelligence. Comput. Oper. Res. 13(5), 533\u2013549 (1986)","journal-title":"Comput. Oper. Res."},{"issue":"3","key":"9350_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1287\/ijoc.1.3.190","volume":"1","author":"F Glover","year":"1989","unstructured":"Glover, F.: Tabu search\u2014part I. ORSA J. Comput. 1(3), 190\u2013206 (1989)","journal-title":"ORSA J. Comput."},{"issue":"1","key":"9350_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1287\/ijoc.2.1.4","volume":"2","author":"F Glover","year":"1990","unstructured":"Glover, F.: Tabu search\u2014part II. ORSA J. Comput. 2(1), 4\u201332 (1990)","journal-title":"ORSA J. Comput."},{"issue":"3","key":"9350_CR13","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1287\/ijoc.2016.0690","volume":"28","author":"CY Han","year":"2016","unstructured":"Han, C.Y., Lunday, B.J., Robbins, M.J.: A game theoretic model for the optimal location of integrated air defense system missile batteries. INFORMS J. Comput. 28(3), 405\u2013416 (2016)","journal-title":"INFORMS J. Comput."},{"issue":"3","key":"9350_CR14","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/S0377-2217(00)00100-4","volume":"130","author":"P Hansen","year":"2001","unstructured":"Hansen, P., Mladenovi\u0107, N.: Variable neighborhood search: principles and applications. Eur. J. Oper. Res. 130(3), 449\u2013467 (2001)","journal-title":"Eur. J. Oper. Res."},{"key":"9350_CR15","doi-asserted-by":"crossref","unstructured":"Hansen, P., Mladenovi\u0107, N.: Variable neighborhood search. In: Burke, E.K., Kendall, G. (eds.) Search Methodologies\u2014Introductory Tutorials in Optimization and Decision Support Techniques, pp. 313\u2013337. Springer, Berlin (2014)","DOI":"10.1007\/978-1-4614-6940-7_12"},{"issue":"1","key":"9350_CR16","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.ejor.2011.03.035","volume":"213","author":"N Haphuriwat","year":"2011","unstructured":"Haphuriwat, N., Bier, V.M.: Trade-offs between target hardening and overarching protection. Eur. J. Oper. Res. 213(1), 320\u2013328 (2011)","journal-title":"Eur. J. Oper. Res."},{"issue":"1","key":"9350_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/00207720903434789","volume":"42","author":"K Hausken","year":"2011","unstructured":"Hausken, K.: Protecting complex infrastructures against multiple strategic attackers. Int. J. Syst. Sci. 42(1), 11\u201329 (2011)","journal-title":"Int. J. Syst. Sci."},{"key":"9350_CR18","unstructured":"Jain, M., Conitzer, V., Tambe, M.: Security scheduling for real-world networks. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, pp. 215\u2013222. International Foundation for Autonomous Agents and Multiagent Systems (2013)"},{"issue":"5\u20136","key":"9350_CR19","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1007\/BF01009452","volume":"34","author":"S Kirkpatrick","year":"1984","unstructured":"Kirkpatrick, S.: Optimization by simulated annealing: quantitative studies. J. Stat. Phys. 34(5\u20136), 975\u2013986 (1984)","journal-title":"J. Stat. Phys."},{"issue":"4598","key":"9350_CR20","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671\u2013680 (1983)","journal-title":"Science"},{"key":"9350_CR21","unstructured":"McMahan, H.B., Gordon, G.J., Blum, A.: Planning in the presence of cost functions controlled by an adversary. In: International Conference on Machine Learning, pp. 536\u2013543 (2003)"},{"key":"9350_CR22","unstructured":"Missile Defense Agency (MDA): Historical funding for MDA FY85-16. \n                    http:\/\/www.mda.mil\/global\/documents\/pdf\/FY16_histfunds.pdf\n                    \n                   (2016a). Accessed 29 March 2016"},{"key":"9350_CR23","unstructured":"Missile Defense Agency (MDA): Missile Defense Agency: a system of elements. \n                    http:\/\/www.mda.mil\/system\/elements.html\n                    \n                   (2016b). Accessed 9 March 2016"},{"issue":"11","key":"9350_CR24","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1016\/S0305-0548(97)00031-2","volume":"24","author":"N Mladenovi\u0107","year":"1997","unstructured":"Mladenovi\u0107, N., Hansen, P.: Variable neighborhood search. Comput. Oper. Res. 24(11), 1097\u20131100 (1997)","journal-title":"Comput. Oper. Res."},{"issue":"2","key":"9350_CR25","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J.: Non-cooperative games. Ann. Math. 54(2), 286\u2013295 (1951)","journal-title":"Ann. Math."},{"key":"9350_CR26","unstructured":"National Air and Space Intelligence Center (NASIC): Ballistic & Cruise Missile Threat (2013)"},{"issue":"6","key":"9350_CR27","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","volume":"35","author":"MP Scaparra","year":"2008","unstructured":"Scaparra, M.P., Church, R.L.: A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 35(6), 1905\u20131923 (2008)","journal-title":"Comput. Oper. Res."},{"issue":"1","key":"9350_CR28","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BF01766400","volume":"4","author":"R Selten","year":"1975","unstructured":"Selten, R.: Reexamination of the perfectness concept for equilibrium points in extensive games. Int. J. Game Theory 4(1), 25\u201355 (1975)","journal-title":"Int. J. Game Theory"},{"key":"9350_CR29","unstructured":"United States Army (U.S. Army): Field Manual 3-01.85 Patriot Battalion and Battery Operations. Headquarters, Department of the Army, Washington (2002)"},{"key":"9350_CR30","unstructured":"United States Department of Defense (US DoD): Program Acquisition Cost by Weapon System. Office of the Secretary of Defense (2014)"},{"key":"9350_CR31","unstructured":"United States Department of Defense (US DoD): Program Acquisition Cost by Weapon System. Office of the Secretary of Defense (2015)"},{"key":"9350_CR32","doi-asserted-by":"crossref","unstructured":"United States Joint Chiefs of Staff (US JCS): Joint Publication 3-01: Countering Air and Missile Threats. The Joint Staff (2012)","DOI":"10.21236\/ADA562213"}],"container-title":["Journal of Heuristics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10732-017-9350-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-017-9350-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10732-017-9350-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T13:19:35Z","timestamp":1589721575000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10732-017-9350-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,13]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9350"],"URL":"https:\/\/doi.org\/10.1007\/s10732-017-9350-0","relation":{},"ISSN":["1381-1231","1572-9397"],"issn-type":[{"type":"print","value":"1381-1231"},{"type":"electronic","value":"1572-9397"}],"subject":[],"published":{"date-parts":[[2017,7,13]]},"assertion":[{"value":"31 March 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}