{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:15Z","timestamp":1755993675204,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iri.2012.6302988","type":"proceedings-article","created":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T16:50:59Z","timestamp":1348073459000},"page":"37-44","source":"Crossref","is-referenced-by-count":3,"title":["A game theoretic approach for adversarial pipeline monitoring using Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Mohammad Saiful","family":"Islam","sequence":"first","affiliation":[{"name":"Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, USA"}]},{"given":"Robert","family":"Nix","sequence":"additional","affiliation":[{"name":"Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, USA"}]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, USA"}]}],"member":"263","reference":[{"key":"17","article-title":"Monitoring of distributed pipeline systems by wireless sensor networks","author":"yuanwei","year":"0","journal-title":"Proceedings of the 2008 IAJC-IJME International Conference 2008"},{"key":"15","first-page":"54","article-title":"Wireless sensing technologies for civil infrastructure monitoring and management","author":"wang","year":"2007","journal-title":"Proceedings of the 5th International Seminar for Safety of Infrastructures"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5687953"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12586-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236396"},{"key":"11","first-page":"895","article-title":"Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games","author":"paruchuri","year":"2008","journal-title":"AAMAS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-30440-3_592"},{"key":"3","first-page":"643","article-title":"Maximum Flow","author":"cormen","year":"2002","journal-title":"Introduction to Algorithms"},{"journal-title":"USA Today","article-title":"Nigerian pipeline blast kills up to 200","year":"0","key":"2"},{"journal-title":"ABC News","article-title":"At least 100 nigerians dead in pipe blast","year":"0","key":"1"},{"journal-title":"Keeping Americas Pipelines Safe and Secure Key Issues for Congress","year":"0","author":"parfomak","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.78"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WTS.2007.4563333"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/48014.61051"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1956-045-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2010.98"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"}],"event":{"name":"2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2012,8,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2012,8,10]]}},"container-title":["2012 IEEE 13th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294629\/6302564\/06302988.pdf?arnumber=6302988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:14:52Z","timestamp":1755908092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6302988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iri.2012.6302988","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}