{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:56:29Z","timestamp":1725706589279},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/iwcmc.2019.8766752","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T19:48:28Z","timestamp":1563824908000},"page":"1847-1852","source":"Crossref","is-referenced-by-count":3,"title":["Solving Security Problems in MEC Systems"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Tahir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"57","article-title":"Leader-follower strategies for robotic patrolling in environments with arbitrary topologies","author":"basilico","year":"2009","journal-title":"AAMAS"},{"key":"ref11","first-page":"557","article-title":"Extending algorithms for mobile robot patrolling in the presence of adveraries to more realistic settings","author":"basilico","year":"2009","journal-title":"WI-IAT"},{"key":"ref12","article-title":"Computing Time-Dependent Policies for Patrolling Games with Mobile Targets","author":"pechoucek","year":"2011","journal-title":"AAMAS"},{"key":"ref13","article-title":"Optimal Patrol Strtegy for Protecting Moving Targets with Multiple Mobile Resiurces","author":"fang","year":"2013","journal-title":"AAMAS"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7733","article-title":"Asynchronous Multi-Robot Patrolling against Intrusion in Arbitrary Topologies","author":"basilico","year":"2010","journal-title":"AAAI"},{"key":"ref15","first-page":"1275","article-title":"Introducing alarms in adverarial patrolling games : extended abstruct","author":"munoz de cote","year":"2013","journal-title":"AAMAS"},{"key":"ref16","first-page":"404","article-title":"A security game combining patrolling and alarm triggered responses under spatial and detection uncertainties","author":"basilico","year":"2016","journal-title":"Proc of the AAAI 2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2012.03.003"},{"key":"ref18","article-title":"Strategy Representation Analysis for Analysis for Patrolling Games","author":"bosansky","year":"2012","journal-title":"AAAI Spring Symposium"},{"key":"ref19","first-page":"1","article-title":"When Traffic Flow Prediction and Wireless Big Data Analytics Meet","author":"chen","year":"2018","journal-title":"IEEE Network"},{"article-title":"Optimal defender allocation for massive security games: A branch and price approach","year":"0","author":"jain","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.96"},{"key":"ref6","first-page":"125","article-title":"Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angles Int. Airport","author":"pita","year":"2008","journal-title":"Proc AAMAS 2008"},{"key":"ref5","first-page":"689","article-title":"Computing optimal randomized resource allocations for massive security games","author":"kiekintveld","year":"2009","journal-title":"Proceedings of AAMAS 2009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2008.4543563"},{"key":"ref7","first-page":"37","article-title":"IRIS-a tool for strategic security allocation in transportation networks categories and subject descriptors","author":"tsai","year":"2009","journal-title":"Proceedings of AAMAS 2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420997"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.158"},{"key":"ref9","first-page":"55","article-title":"The impact of adversarial knowledge on adverarial planning in perimeter patrol","author":"agmon","year":"2008","journal-title":"Proc AAMAS 2008"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/MNET.2019.1800458","article-title":"Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems","author":"chen","year":"2019","journal-title":"IEEE Network Magazine"},{"key":"ref22","article-title":"Quasi-regular sequences and optimal randomized resource allocations for massive security games","author":"kempe","year":"2018","journal-title":"Proceedings of SODA 2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28645-5_48"},{"key":"ref23","first-page":"1139","article-title":"Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness","author":"yin","year":"2010","journal-title":"AAMAS"}],"event":{"name":"2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2019,6,24]]},"location":"Tangier, Morocco","end":{"date-parts":[[2019,6,28]]}},"container-title":["2019 15th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8761262\/8766347\/08766752.pdf?arnumber=8766752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T08:58:39Z","timestamp":1695027519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8766752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2019.8766752","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}