{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:49Z","timestamp":1740122809463,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T00:00:00Z","timestamp":1518652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61170201"],"award-info":[{"award-number":["61170201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent peaks project In Jiangsu Province","doi-asserted-by":"crossref","award":["2011-DZXX-032"],"award-info":[{"award-number":["2011-DZXX-032"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11042-018-5750-x","type":"journal-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T08:10:11Z","timestamp":1518682211000},"page":"10961-10977","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A double oracle algorithm for allocating resources on nodes in graph-based security games"],"prefix":"10.1007","volume":"77","author":[{"given":"Zhou","family":"Yang","sequence":"first","affiliation":[]},{"given":"Junwu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Jiajie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zeyu","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,15]]},"reference":[{"key":"5750_CR1","doi-asserted-by":"crossref","unstructured":"Conitzer V, Sandholm T (2006) Computing the optimal strategy to commit to. In: ACM conference on electronic commerce. DBLP, pp 82\u201390","DOI":"10.1145\/1134707.1134717"},{"key":"5750_CR2","unstructured":"Halvorson E, Conitzer V, Parr R (2009) Multi-step multi-sensor hider-seeker games. In: International joint conference on artificial intelligence. Morgan Kaufmann Publishers Inc, pp 159\u2013166"},{"key":"5750_CR3","unstructured":"Jain M, Conitzer V, Tambe M (2013) Security scheduling for real-world networks. In: International conference on autonomous agents and multi-agent systems, pp 215\u2013222"},{"key":"5750_CR4","unstructured":"Jain M, VanKorzhyk D et al (2011) A double oracle algorithm for zero-sum security games on graphs. In: International conference on autonomous agents and multiagent systems. DBLP, pp 327\u2013334"},{"key":"5750_CR5","unstructured":"Kiekintveld C, Jain M, Tsai J, Pita J, Tambe M, Ordonez F (2009) Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th international conference on autonomous agents and multiagent systems (AAMAS), pp 689\u2013696"},{"key":"5750_CR6","unstructured":"Lu H, Li Y, Chen M, Kim H, Serikawa S (2017) Brain intelligence: go beyond artificial intelligence. Mobile Networks & Applications (7553):1\u20138"},{"key":"5750_CR7","unstructured":"Mcmahan HB, Gordon GJ, Blum A (2003) Planning in the presence of cost functions controlled by an adversary. In: Machine learning, proceedings of the twentieth international conference. DBLP, pp 536\u2013543"},{"issue":"1","key":"5750_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1609\/aimag.v30i1.2173","volume":"30","author":"J Pita","year":"2009","unstructured":"Pita J, Jain M, Ord\u00f3\u00f1ez F et al (2009) Using game theory for Los Angeles airport security. Ai Mag 30(1):43\u201357","journal-title":"Ai Mag"},{"key":"5750_CR9","unstructured":"Shieh E, An B, Yang R et al (2012) PROTECT: a deployed game theoretic system to protect the ports of the United States. In: International conference on autonomous agents and multiagent systems , pp 13\u201320"},{"key":"5750_CR10","unstructured":"Tsai J, Rathi S, Kiekintveld C et al (2009) IRIS-a tool for strategic security allocation in transportation networks. In: Adaptive agents and multi-agents systems"},{"key":"5750_CR11","doi-asserted-by":"crossref","unstructured":"Van\u011bk O, Bo\u0161ansk\u00fd B, Jakob M et al (2010) Transiting areas patrolled by a mobile adversary. In: Computational intelligence and games. IEEE, pp 9\u201316","DOI":"10.1109\/ITW.2010.5593377"},{"key":"5750_CR12","volume-title":"Marktform und Gleichgewicht","author":"H von Stackelberg","year":"1934","unstructured":"von Stackelberg H (1934) Marktform und Gleichgewicht. Springer, Vienna"},{"issue":"5","key":"5750_CR13","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/0005-1098(90)90001-X","volume":"26","author":"FY Wang","year":"1990","unstructured":"Wang FY, Saridis GN (1990) A coordination theory for intelligent machines. Automatica 26(5):833\u2013 844","journal-title":"Automatica"},{"key":"5750_CR14","unstructured":"Yang R, Fang F, Jiang AX et al (2012) Designing better strategies against human adversaries in network security games. In: International conference on autonomous agents and multiagent systems, pp 1299\u20131300"},{"key":"5750_CR15","unstructured":"Yang R, Ford B, Tambe M et al (2014) Adaptive resource allocation for wildlife protection against illegal poachers. In: International conference on autonomous agents and multiagent systems"},{"key":"5750_CR16","unstructured":"Yin Z, Korzhyk D, Kiekintveld C, Conitzer V, Tambe M (2010) Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In: AAMAS, pp 1139\u20131146"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5750-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:28:40Z","timestamp":1550172520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5750-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,15]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["5750"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5750-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,2,15]]},"assertion":[{"value":"13 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}