{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:32:20Z","timestamp":1765438340360},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/allerton.2012.6483443","type":"proceedings-article","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T20:58:45Z","timestamp":1364417925000},"page":"1822-1829","source":"Crossref","is-referenced-by-count":27,"title":["Game theory for security: Key algorithmic principles, deployed systems, lessons learned"],"prefix":"10.1109","author":[{"given":"Milind","family":"Tambe","sequence":"first","affiliation":[]},{"given":"Manish","family":"Jain","sequence":"additional","affiliation":[]},{"given":"James Adam","family":"Pita","sequence":"additional","affiliation":[]},{"given":"Albert Xin","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1100.0505"},{"key":"35","article-title":"PROTECT: A deployed game theoretic system to protect the ports of the united states","author":"shieh","year":"2012","journal-title":"Proc of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"17","article-title":"Quality-bounded solutions for finite bayesian Stackelberg games: Scaling up","author":"jain","year":"2011","journal-title":"Proc of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.73.5.90"},{"key":"18","article-title":"A double oracle algorithm for zero-sum security games on graphs","author":"jain","year":"2011","journal-title":"Proc of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.006"},{"journal-title":"Finding Optimal Strategies for Influencing Social Networks in Two Player Games","year":"2011","author":"howard","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1177\/1046878103255492"},{"key":"16","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1609\/aaai.v24i1.7611","article-title":"Security games with arbitrary schedules: A branch and price approach","author":"jain","year":"2010","journal-title":"Proc of the 24th AAAI Conference on Artificial Intelligence"},{"year":"2011","key":"39"},{"key":"13","first-page":"403","article-title":"Game theoretical insights in strategic patrolling: Model and algorithm in normal-form","author":"gatti","year":"2008","journal-title":"ECAI-08"},{"journal-title":"Faregating Analysis Report Commissioned by the la Metro","year":"2007","author":"hamilton","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.005"},{"key":"11","article-title":"Battle for mumbai ends, death toll rises to 195","author":"chandran","year":"2008","journal-title":"Times of India"},{"journal-title":"Layers of Security What We Do","year":"2011","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"21","article-title":"Patrolling to maximize pristine forest area","author":"johnson","year":"2012","journal-title":"Proc of the AAAI Spring Symposium on Game Theory for Security Sustainability and Health"},{"key":"20","article-title":"Towards optimal patrol strategies for urban security in transit systems","author":"jiang","year":"2012","journal-title":"Proc of the AAAI Spring Symposium on Game Theory for Security Sustainability and Health"},{"key":"43","article-title":"Improving resource allocation strategy against human adversaries in security games","author":"yang","year":"2011","journal-title":"IJCAI"},{"key":"42","article-title":"Leadership with commitment to mixed strategies","author":"von stengel","year":"2004","journal-title":"CDAM Research Report Tech Rep LSE-CDAM-2004-01"},{"journal-title":"Marktform und Gleichgewicht","year":"1934","author":"von stackelberg","key":"41"},{"key":"40","article-title":"Game-theoretic resource allocation for malicious packet detection in computer networks","author":"vanek","year":"2012","journal-title":"Proc of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v26i2.18975","article-title":"TRUSTS: Scheduling randomized patrols for fare inspection in transit systems","author":"yin","year":"2012","journal-title":"Proc of the 24th Conference on Innovative Applications of Artificial Intelligence (IAAI)"},{"key":"44","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1609\/aaai.v25i1.7862","article-title":"Risk-averse strategies for security games with execution and observational uncertainty","author":"yin","year":"2011","journal-title":"Proc of the 25th AAAI Conference on Artificial Intelligence (AAAI)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"journal-title":"TSA Federal Air Marshals","year":"2010","author":"keteyian","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.008"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.011"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00933155"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0060-x"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1023"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osbourne","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1978721.1978729"},{"key":"2","first-page":"8","article-title":"Mixed-initiative optimization in security games: A preliminary report","author":"an","year":"2011","journal-title":"Proc of the AAAI Spring Symposium on Help Me Help You Bridging the Gaps in Human-Agent Collaboration"},{"key":"10","article-title":"Multi-objective optimization for security games","author":"brown","year":"2012","journal-title":"Proc of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511760778"},{"key":"30","first-page":"895","article-title":"Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games","author":"paruchuri","year":"2008","journal-title":"Proc of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF00939867"},{"journal-title":"Introduction to Linear Optimization","year":"1994","author":"bertsimas","key":"6"},{"key":"32","first-page":"125","article-title":"Deployed ARMOR protection: The application of a game-theoretic model for security at the los angeles international airport","author":"pita","year":"2008","journal-title":"Proc of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-0005(02)03014-X"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.07.002"},{"key":"4","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1609\/aaai.v25i1.7864","article-title":"Refinement of strong stackelberg equilibria in security games","author":"an","year":"2011","journal-title":"Proc of the 25th Conference on Artificial Intelligence"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0252"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0231"}],"event":{"name":"2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2012,10,1]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2012,10,5]]}},"container-title":["2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6475439\/6483185\/06483443.pdf?arnumber=6483443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T02:02:43Z","timestamp":1715133763000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6483443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/allerton.2012.6483443","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}