{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:16:40Z","timestamp":1762255000473,"version":"3.30.2"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T00:00:00Z","timestamp":1728000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T00:00:00Z","timestamp":1728000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Oper Res Int J"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s12351-024-00870-5","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T08:02:18Z","timestamp":1728028938000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A bilevel hierarchical covering model to protect a healthcare network against failures"],"prefix":"10.1007","volume":"24","author":[{"given":"Raheleh","family":"Khanduzi","sequence":"first","affiliation":[]},{"given":"\u0130hsan","family":"Sadati","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Akbari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,4]]},"reference":[{"issue":"7","key":"870_CR1","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1016\/j.cor.2011.08.006","volume":"39","author":"D Aksen","year":"2012","unstructured":"Aksen D, Aras N (2012) A bilevel fixed charge location model for facilities under imminent attack. Comput Oper Res 39(7):1364\u20131381","journal-title":"Comput Oper Res"},{"key":"870_CR2","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-37838-6_5","volume-title":"Metaheuristics for Bi-level Optimization","author":"D Aksen","year":"2013","unstructured":"Aksen D, Aras N (2013) A matheuristic for leader-follower games involving facility location-protection-interdiction decisions. In: Talbi E-G (ed) Metaheuristics for Bi-level Optimization. Springer, Berlin, pp 115\u2013151. https:\/\/doi.org\/10.1007\/978-3-642-37838-6_5"},{"issue":"2","key":"870_CR3","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10732-011-9163-5","volume":"19","author":"D Aksen","year":"2013","unstructured":"Aksen D, Aras N, Piyade N (2013) A bilevel p-median model for the planning and protection of critical facilities. J Heuristics 19(2):373\u2013398","journal-title":"J Heuristics"},{"key":"870_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.cor.2015.05.016","volume":"64","author":"N Aliakbarian","year":"2015","unstructured":"Aliakbarian N, Dehghanian F, Salari M (2015) A bi-level programming model for protection of hierarchical facilities under imminent attacks. Comput Oper Res 64:210\u2013224","journal-title":"Comput Oper Res"},{"issue":"2","key":"870_CR5","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/BF00941574","volume":"68","author":"JF Bard","year":"1991","unstructured":"Bard JF (1991) Some properties of the bilevel programming problem. J Optim Theory Appl 68(2):371\u2013378","journal-title":"J Optim Theory Appl"},{"issue":"3","key":"870_CR6","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1287\/opre.38.3.556","volume":"38","author":"O Ben-Ayed","year":"1990","unstructured":"Ben-Ayed O, Blair CE (1990) Computational difficulties of bilevel linear programming. Oper Res 38(3):556\u2013560","journal-title":"Oper Res"},{"issue":"2","key":"870_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.seps.2012.01.002","volume":"46","author":"ML Burkey","year":"2012","unstructured":"Burkey ML, Bhadury J, Eiselt HA (2012) A location-based comparison of health care services in four US states with efficiency and equity. Socioecon Plann Sci 46(2):157\u2013163","journal-title":"Socioecon Plann Sci"},{"key":"870_CR8","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s12351-017-0357-y","volume":"20","author":"MS Casas-Ram\u00edrez","year":"2020","unstructured":"Casas-Ram\u00edrez MS, Camacho-Vallejo JF, D\u00edaz JA, Luna DE (2020) A bi-level maximal covering location problem. Oper Res Int J 20:827\u2013855","journal-title":"Oper Res Int J"},{"issue":"2","key":"870_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1111\/j.1538-4632.2007.00698.x","volume":"39","author":"RL Church","year":"2007","unstructured":"Church RL, Scaparra MP (2007) Protecting critical assets: the r-interdiction median problem with fortification. Geogr Anal 39(2):129\u2013146","journal-title":"Geogr Anal"},{"key":"870_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10479-007-0176-2","volume":"153","author":"B Colson","year":"2007","unstructured":"Colson B, Marcotte P, Savard G (2007) An overview of bilevel optimization. Ann Oper Res 153:235\u2013256","journal-title":"Ann Oper Res"},{"key":"870_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.eswa.2017.04.002","volume":"82","author":"JA D\u00edaz","year":"2017","unstructured":"D\u00edaz JA, Luna DE, Camacho-Vallejo JF, Casas-Ram\u00edrez MS (2017) GRASP and hybrid GRASP-Tabu heuristics to solve a maximal covering location problem with customer preference ordering. Expert Syst Appl 82:67\u201376","journal-title":"Expert Syst Appl"},{"key":"870_CR12","doi-asserted-by":"crossref","unstructured":"Dong L, Xu-chen L, Xiang-tao Y, & Fei W. (2010). A model for allocating protection resources in military logistics distribution system based on maximal covering problem. In 2010 International conference on logistics systems and intelligent management (ICLSIM) Vol. 1, pp 98\u2013101. IEEE.","DOI":"10.1109\/ICLSIM.2010.5461461"},{"key":"870_CR13","doi-asserted-by":"publisher","first-page":"104831","DOI":"10.1016\/j.cor.2019.104831","volume":"114","author":"A Forghani","year":"2020","unstructured":"Forghani A, Dehghanian F, Salari M, Ghiami Y (2020) A bi-level model and solution methods for partial interdiction problem on capacitated hierarchical facilities. Comput Oper Res 114:104831","journal-title":"Comput Oper Res"},{"issue":"3","key":"870_CR14","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/S0377-2217(01)00172-2","volume":"138","author":"RD Galvao","year":"2002","unstructured":"Galvao RD, Espejo LGA, Boffey B (2002) A hierarchical model for the location of perinatal facilities in the municipality of Rio de Janeiro. Eur J Oper Res 138(3):495\u2013517","journal-title":"Eur J Oper Res"},{"issue":"5","key":"870_CR16","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/0305-0548(86)90048-1","volume":"13","author":"F Glover","year":"1986","unstructured":"Glover F (1986) Future paths for integer programming and links to artificial intelligence. Comput Oper Res 13(5):533\u2013549","journal-title":"Comput Oper Res"},{"issue":"1","key":"870_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1287\/ijoc.2.1.4","volume":"2","author":"F Glover","year":"1990","unstructured":"Glover F (1990) Tabu search\u2014part II. ORSA J Comput 2(1):4\u201332","journal-title":"ORSA J Comput"},{"issue":"2","key":"870_CR18","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.omega.2004.03.011","volume":"33","author":"PR Harper","year":"2005","unstructured":"Harper PR, Shahani AK, Gallagher JE, Bowie C (2005) Planning health services with explicit geographical considerations: a stochastic location\u2013allocation approach. Omega 33(2):141\u2013152","journal-title":"Omega"},{"issue":"2","key":"870_CR19","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.ejor.2016.06.033","volume":"256","author":"K Hausken","year":"2017","unstructured":"Hausken K (2017) Defense and attack for interdependent systems. Eur J Oper Res 256(2):582\u2013591","journal-title":"Eur J Oper Res"},{"key":"870_CR20","unstructured":"Hwang CL, Masud ASM. (2012). Multiple objective decision making\u2014methods and applications: a state-of-the-art survey. Springer Science."},{"key":"870_CR21","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.tre.2018.04.004","volume":"114","author":"S Jalali","year":"2018","unstructured":"Jalali S, Seifbarghy M, Niaki STA (2018) A risk-averse location-protection problem under intentional facility disruptions: A modified hybrid decomposition algorithm. Trans Res Part e: Logist Transp Rev 114:196\u2013219","journal-title":"Trans Res Part e: Logist Transp Rev"},{"issue":"9","key":"870_CR22","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1007\/s10489-017-1116-8","volume":"48","author":"R Khanduzi","year":"2018","unstructured":"Khanduzi R, Maleki HR (2018) A novel bilevel model and solution algorithms for multi-period interdiction problem with fortification. Appl Intell 48(9):2770\u20132791","journal-title":"Appl Intell"},{"key":"870_CR23","doi-asserted-by":"publisher","first-page":"e4396","DOI":"10.1002\/ett.4396","volume":"33","author":"R Khanduzi","year":"2021","unstructured":"Khanduzi R, Rastegar A (2021) An efficient and robust hybrid metaheuristic method to solve a hierarchical bi-level protection-interdiction problem on real healthcare system. Trans Emerg Telecommun Technol 33:e4396","journal-title":"Trans Emerg Telecommun Technol"},{"key":"870_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/B978-0-12-821187-8.00003-4","volume-title":"Intelligent IoT systems in personalized health Care","author":"R Khanduzi","year":"2021","unstructured":"Khanduzi R, Rastegar A (2021) Designing a cooperative hierarchical model of interdiction median problem with protection and its solution approach: A case study of health-care network. Intelligent IoT systems in personalized health Care. Elsevier, pp 53\u201388. https:\/\/doi.org\/10.1016\/B978-0-12-821187-8.00003-4"},{"key":"870_CR25","doi-asserted-by":"publisher","first-page":"106459","DOI":"10.1016\/j.compeleceng.2019.106459","volume":"79","author":"R Khanduzi","year":"2019","unstructured":"Khanduzi R, Sangaiah AK (2019a) Tabu search based on exact approach for protecting hubs against jamming attacks. Comput Electr Eng 79:106459","journal-title":"Comput Electr Eng"},{"key":"870_CR26","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.asoc.2018.11.010","volume":"75","author":"R Khanduzi","year":"2019","unstructured":"Khanduzi R, Sangaiah AK (2019b) A fast genetic algorithm for a critical protection problem in biomedical supply chain networks. Appl Soft Comput 75:162\u2013179","journal-title":"Appl Soft Comput"},{"issue":"17","key":"870_CR27","doi-asserted-by":"publisher","first-page":"5901","DOI":"10.1007\/s00500-018-3005-4","volume":"22","author":"R Khanduzi","year":"2018","unstructured":"Khanduzi R, Maleki HR, Akbari R (2018) Two novel combined approaches based on TLBO and PSO for a partial interdiction\/fortification problem using capacitated facilities and budget constraint. Soft Comput 22(17):5901\u20135919","journal-title":"Soft Comput"},{"issue":"1","key":"870_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1051\/ro\/2018095","volume":"54","author":"M Khorbatly","year":"2020","unstructured":"Khorbatly M, Dkhil H, Alabboud H, Yassine A (2020) A hybrid algorithm Tabu Search\u2013GRASP for wounded evacuation in disaster response. RAIRO-Oper Res 54(1):19\u201336","journal-title":"RAIRO-Oper Res"},{"key":"870_CR29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cor.2017.09.004","volume":"90","author":"X Lei","year":"2018","unstructured":"Lei X, Shen S, Song Y (2018) Stochastic maximum flow interdiction problems under heterogeneous risk preferences. Comput Oper Res 90:97\u2013109","journal-title":"Comput Oper Res"},{"issue":"7","key":"870_CR30","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1057\/palgrave.jors.2602644","volume":"60","author":"XY Li","year":"2009","unstructured":"Li XY, Tian P, Leung SC (2009) An ant colony optimization metaheuristic hybridized with tabu search for open vehicle routing problems. J Oper Res Soc 60(7):1012\u20131025","journal-title":"J Oper Res Soc"},{"key":"870_CR31","doi-asserted-by":"publisher","first-page":"108005","DOI":"10.1016\/j.ress.2021.108005","volume":"216","author":"Q Li","year":"2021","unstructured":"Li Q, Li M, Zhang R, Gan J (2021) A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy. Reliab Eng Syst Saf 216:108005","journal-title":"Reliab Eng Syst Saf"},{"key":"870_CR33","doi-asserted-by":"publisher","first-page":"108440","DOI":"10.1016\/j.ress.2022.108440","volume":"223","author":"Q Li","year":"2022","unstructured":"Li Q, Li M, Gong Z, Tian Y, Zhang R (2022) Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers. Reliab Eng Syst Saf 223:108440","journal-title":"Reliab Eng Syst Saf"},{"key":"870_CR34","unstructured":"Losada C, Scaparra MP, Church RL, Daskin MS. (2010). The multiple resource probabilistic interdiction median problem. Kent Business School Working Paper, (187)."},{"key":"870_CR35","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cie.2016.11.004","volume":"102","author":"M Mahmoodjanloo","year":"2016","unstructured":"Mahmoodjanloo M, Parvasi SP, Ramezanian R (2016) A tri-level covering fortification model for facility protection against disturbance in r-interdiction median problem. Comput Ind Eng 102:219\u2013232","journal-title":"Comput Ind Eng"},{"issue":"15","key":"870_CR36","first-page":"255","volume":"7","author":"M Mesibidgoli","year":"2020","unstructured":"Mesibidgoli M, Jouzdani J (2020) A Tabu-search algorithm for location-interdiction-protection problem under asymmetric information. J Ind Eng Res Prod Syst 7(15):255\u2013271","journal-title":"J Ind Eng Res Prod Syst"},{"issue":"3","key":"870_CR37","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.ejor.2014.07.024","volume":"240","author":"AM Mestre","year":"2015","unstructured":"Mestre AM, Oliveira MD, Barbosa-P\u00f3voa AP (2015) Location\u2013allocation approaches for hospital network planning under uncertainty. Eur J Oper Res 240(3):791\u2013806","journal-title":"Eur J Oper Res"},{"key":"870_CR38","doi-asserted-by":"publisher","first-page":"107708","DOI":"10.1016\/j.cie.2021.107708","volume":"162","author":"M Mirzaei","year":"2021","unstructured":"Mirzaei M, Al-e SMJM, Shirazi MA (2021) A maximum-flow network interdiction problem in an uncertain environment under information asymmetry condition: application to smuggling goods. Comput Ind Eng 162:107708","journal-title":"Comput Ind Eng"},{"key":"870_CR39","doi-asserted-by":"crossref","unstructured":"Mrkela L, & Stanimirovi\u0107 Z. (2020). A bi-objective maximal covering location problem: a service network design application. In 2020 International conference on innovations in intelligent systems and applications (INISTA) pp 1\u20137. IEEE.","DOI":"10.1109\/INISTA49547.2020.9194660"},{"key":"870_CR40","doi-asserted-by":"publisher","first-page":"102166","DOI":"10.1016\/j.tre.2020.102166","volume":"145","author":"A Parajuli","year":"2021","unstructured":"Parajuli A, Kuzgunkaya O, Vidyarthi N (2021) The impact of congestion on protection decisions in supply networks under disruptions. Transp Res Part e: Logist Transp Rev 145:102166","journal-title":"Transp Res Part e: Logist Transp Rev"},{"key":"870_CR41","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ress.2016.01.002","volume":"149","author":"R Peng","year":"2016","unstructured":"Peng R, Zhai QQ, Levitin G (2016) Defending a single object against an attacker trying to detect a subset of false targets. Reliab Eng Syst Saf 149:137\u2013147","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"870_CR42","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10100-017-0494-7","volume":"27","author":"MC Roboredo","year":"2019","unstructured":"Roboredo MC, Aizemberg L, Pessoa AA (2019) An exact approach for the r-interdiction covering problem with fortification. CEJOR 27(1):111\u2013131","journal-title":"CEJOR"},{"issue":"2","key":"870_CR43","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1111\/itor.12669","volume":"27","author":"MEH Sadati","year":"2020","unstructured":"Sadati MEH, Aksen D, Aras N (2020a) The r-interdiction selective multi-depot vehicle routing problem. Int Trans Oper Res 27(2):835\u2013866","journal-title":"Int Trans Oper Res"},{"key":"870_CR44","doi-asserted-by":"publisher","first-page":"104996","DOI":"10.1016\/j.cor.2020.104996","volume":"123","author":"MEH Sadati","year":"2020","unstructured":"Sadati MEH, Aksen D, Aras N (2020b) A trilevel r-interdiction selective multi-depot vehicle routing problem with depot protection. Comput Oper Res 123:104996","journal-title":"Comput Oper Res"},{"issue":"1","key":"870_CR45","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ejor.2007.05.027","volume":"189","author":"MP Scaparra","year":"2008","unstructured":"Scaparra MP, Church RL (2008a) An exact solution approach for the interdiction median problem with fortification. Eur J Oper Res 189(1):76\u201392","journal-title":"Eur J Oper Res"},{"issue":"6","key":"870_CR46","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","volume":"35","author":"MP Scaparra","year":"2008","unstructured":"Scaparra MP, Church RL (2008b) A bilevel mixed-integer program for critical infrastructure protection planning. Comput Oper Res 35(6):1905\u20131923","journal-title":"Comput Oper Res"},{"issue":"2","key":"870_CR47","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1177\/0160017611435357","volume":"35","author":"MP Scaparra","year":"2012","unstructured":"Scaparra MP, Church R (2012) Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Int Reg Sci Rev 35(2):188\u2013210","journal-title":"Int Reg Sci Rev"},{"key":"870_CR48","volume-title":"The theory of market economy","author":"H Stackelberg","year":"1952","unstructured":"Stackelberg H (1952) The theory of market economy. Oxford University Press, Oxford"},{"issue":"2","key":"870_CR49","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.ejor.2015.07.025","volume":"248","author":"S Starita","year":"2016","unstructured":"Starita S, Scaparra MP (2016) Optimizing dynamic investment decisions for railway systems protection. Eur J Oper Res 248(2):543\u2013557","journal-title":"Eur J Oper Res"},{"key":"870_CR50","first-page":"1","volume":"69","author":"S Starita","year":"2017","unstructured":"Starita S, Scaparra MP (2017) Passenger railway network protection: a model with variable post-disruption demand service. J Oper Res Soc 69:1\u201318","journal-title":"J Oper Res Soc"},{"key":"870_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37838-6","volume-title":"Metaheuristics for Bi-level optimization","author":"E Talbi","year":"2013","unstructured":"Talbi E (2013) Metaheuristics for Bi-level optimization. Springer-Verlag, Berlin Heidelberg"},{"key":"870_CR52","doi-asserted-by":"crossref","unstructured":"Uno T, Kato K. (2011). An interactive fuzzy satisficing method for multiobjective stochastic defensive location problems. In: 2011 IEEE international conference on fuzzy systems (FUZZ-IEEE 2011) pp 879\u2013883. IEEE.","DOI":"10.1109\/FUZZY.2011.6007501"},{"issue":"1","key":"870_CR53","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ejor.2007.04.003","volume":"188","author":"T Uno","year":"2008","unstructured":"Uno T, Katagiri H (2008) Single-and multi-objective defensive location problems on a network. Eur J Oper Res 188(1):76\u201384","journal-title":"Eur J Oper Res"},{"issue":"10","key":"870_CR54","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1057\/palgrave.jors.2601919","volume":"56","author":"FJ Vasko","year":"2005","unstructured":"Vasko FJ, Knolle PJ, Spiegel DS (2005) An empirical study of hybrid genetic algorithms for the set covering problem. J Oper Res Soc 56(10):1213\u20131223","journal-title":"J Oper Res Soc"},{"key":"870_CR55","doi-asserted-by":"publisher","first-page":"106480","DOI":"10.1016\/j.cie.2020.106480","volume":"144","author":"Y Xiang","year":"2020","unstructured":"Xiang Y, Wei H (2020) Joint optimizing network interdiction and emergency facility location in terrorist attacks. Comput Ind Eng 144:106480","journal-title":"Comput Ind Eng"},{"key":"870_CR56","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cie.2017.04.036","volume":"109","author":"N Zarrinpoor","year":"2017","unstructured":"Zarrinpoor N, Fallahnezhad MS, Pishvaee MS (2017) Design of a reliable hierarchical location-allocation model under disruptions for health service networks: a two-stage robust approach. Comput Ind Eng 109:130\u2013150","journal-title":"Comput Ind Eng"},{"issue":"3","key":"870_CR57","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.ejor.2017.08.023","volume":"265","author":"N Zarrinpoor","year":"2018","unstructured":"Zarrinpoor N, Fallahnezhad MS, Pishvaee MS (2018) The design of a reliable and robust hierarchical health service network using an accelerated Benders decomposition algorithm. Eur J Oper Res 265(3):1013\u20131032","journal-title":"Eur J Oper Res"},{"issue":"1\u20134","key":"870_CR58","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s00170-015-7756-0","volume":"84","author":"X Zhang","year":"2016","unstructured":"Zhang X, Zheng Z, Zhang S, Du W (2016) Partial interdiction median models for multi-sourcing supply systems. Int J Adv Manuf Technol 84(1\u20134):165\u2013181","journal-title":"Int J Adv Manuf Technol"},{"key":"870_CR59","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.ress.2017.08.005","volume":"169","author":"C Zhang","year":"2018","unstructured":"Zhang C, Ramirez-Marquez JE, Li Q (2018) Locating and protecting facilities from intentional attacks using secrecy. Reliab Eng Syst Saf 169:51\u201362","journal-title":"Reliab Eng Syst Saf"},{"key":"870_CR60","doi-asserted-by":"publisher","first-page":"107617","DOI":"10.1016\/j.ress.2021.107617","volume":"211","author":"X Zhang","year":"2021","unstructured":"Zhang X, Ding S, Ge B, Xia B, Pedrycz W (2021a) Resource allocation among multiple targets for a defender-attacker game with false targets consideration. Reliab Eng Syst Saf 211:107617","journal-title":"Reliab Eng Syst Saf"},{"key":"870_CR61","doi-asserted-by":"publisher","first-page":"107165","DOI":"10.1016\/j.ress.2020.107165","volume":"205","author":"J Zhang","year":"2021","unstructured":"Zhang J, Wang Y, Zhuang J (2021b) Modeling multi-target defender-attacker games with quantal response attack strategies. Reliab Eng Syst Saf 205:107165","journal-title":"Reliab Eng Syst Saf"}],"container-title":["Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12351-024-00870-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12351-024-00870-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12351-024-00870-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T20:02:49Z","timestamp":1734120169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12351-024-00870-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,4]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["870"],"URL":"https:\/\/doi.org\/10.1007\/s12351-024-00870-5","relation":{},"ISSN":["1109-2858","1866-1505"],"issn-type":[{"type":"print","value":"1109-2858"},{"type":"electronic","value":"1866-1505"}],"subject":[],"published":{"date-parts":[[2024,10,4]]},"assertion":[{"value":"19 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"61"}}