{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:59:58Z","timestamp":1725472798091},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/cig.2009.5286477","type":"proceedings-article","created":{"date-parts":[[2009,10,14]],"date-time":"2009-10-14T16:02:09Z","timestamp":1255536129000},"page":"186-193","source":"Crossref","is-referenced-by-count":3,"title":["Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games"],"prefix":"10.1109","author":[{"given":"Nicola","family":"Basilico","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Gatti","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Rossi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"leadership with commitment to mixed strategies","author":"von stengel","year":"2004","journal-title":"CDAM Research Report"},{"year":"0","key":"15"},{"key":"16","first-page":"3310","article-title":"optimal and efficient path planning for partially known environments","author":"stentz","year":"1994","journal-title":"Proc ICRA"},{"key":"13","first-page":"895","article-title":"playing games for security: an efficient exact algorithm for solving bayesian stackelberg games","author":"paruchuri","year":"2008","journal-title":"Proc AAMAS"},{"key":"14","first-page":"311","article-title":"an efficient heuristic approach for security against multiple adversaries","author":"paruchuri","year":"2007","journal-title":"Proc AAMAS"},{"key":"11","article-title":"multi-step multi-sensor hiderseeker games","author":"halvorson","year":"2009","journal-title":"Proc IJCAI"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2007.368081"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.324"},{"key":"2","article-title":"uncertainties in adversarial patrol","author":"agmon","year":"2009","journal-title":"Proc AAMAS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2008.4543563"},{"key":"10","first-page":"403","article-title":"game theoretical insights in strategic patrolling: model and algorithm in normal-form","author":"gatti","year":"2008","journal-title":"Proc ECAI"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.18.5.107"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.211"},{"key":"5","article-title":"leader-follower strategies for robotic patrolling in environments with arbitrary topologies","author":"basilico","year":"2009","journal-title":"Proc AAMAS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152497"},{"journal-title":"Game Theory","year":"1991","author":"fudemberg","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.36.5.519"}],"event":{"name":"2009 IEEE Symposium on Computational Intelligence and Games (CIG)","start":{"date-parts":[[2009,9,7]]},"location":"Milano, Italy","end":{"date-parts":[[2009,9,10]]}},"container-title":["2009 IEEE Symposium on Computational Intelligence and Games"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5278415\/5286449\/05286477.pdf?arnumber=5286477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T04:55:05Z","timestamp":1489899305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5286477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cig.2009.5286477","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}