{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:38:25Z","timestamp":1768423105549,"version":"3.49.0"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Swedish Civil Contingencies Agency"},{"DOI":"10.13039\/100030798","name":"Digital Futures","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100030798","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Building Attack Resilience into Complex Networks"},{"name":"NSF","award":["2039771"],"award-info":[{"award-number":["2039771"]}]},{"name":"C3.ai"},{"name":"CLAIRE: Causal reasoning for real-time attack localization in cyber-physical systems"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tcns.2023.3333392","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T19:12:27Z","timestamp":1700161947000},"page":"1165-1176","source":"Crossref","is-referenced-by-count":3,"title":["Strategic Monitoring of Networked Systems With Heterogeneous Security Levels"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2045-5665","authenticated-orcid":false,"given":"Jezdimir","family":"Milo\u0161evi\u0107","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0973-6973","authenticated-orcid":false,"given":"Mathieu","family":"Dahan","sequence":"additional","affiliation":[{"name":"School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1554-015X","authenticated-orcid":false,"given":"Saurabh","family":"Amin","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1835-2963","authenticated-orcid":false,"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref2","article-title":"Responding to Russian attacks on Ukraines power sector","volume-title":"Center Strategic Int. Stud.","author":"Majkut","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-82e2008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814443"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2021.2180"},{"key":"ref7","first-page":"2133","article-title":"Randomized sensing in adversarial environments","volume-title":"Proc. 22nd Int. Joint Conf. Artif. Intell.","author":"Krause","year":"2011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99660-8_8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.04.033"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/restud\/rdu013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0434"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.03.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47413-7_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0252"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-009-0665-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12333"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.2017.0749"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/opre.43.2.243"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.46.2.184"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77247-9_24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2014.0062"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2019.1853"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/120893938"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2022.1279"},{"key":"ref26","volume-title":"The Theory of Search Games and Rendezvous","volume":"55","author":"Alpern","year":"2006"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.15807\/jorsj.59.1"},{"key":"ref28","article-title":"Hide-and-seek game with capacitated locations and imperfect detection","author":"Bahamondes","year":"2023","journal-title":"Decis. Anal."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524914"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2004.824698"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.06.005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2981392"},{"key":"ref33","first-page":"125","article-title":"Deployed armor protection: The application of a game theoretic model for security at the los angeles international airport","volume-title":"Proc. 7th Int. joint Conf. Auton. Agents Multiagent Syst.","author":"Pita","year":"2008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/ACC53348.2022.9867753"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2022.822"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2020.104855"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029427"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2584183"},{"key":"ref39","article-title":"PG&E improves gas leak survey capability with heath consultants advanced detection device","year":"2012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6615-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/rs6010740"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2009.03.011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975031.148"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2021.04.012"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1006\/game.1999.0738"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814918"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1021\/acs.est.6b06095"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.watres.2011.10.058"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1021\/es3014024"},{"key":"ref51","author":"Ross","year":"2012","journal-title":"Guide for Conducting Risk Assessments"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000352"},{"key":"ref53","article-title":"Security metrics and allocation of security resources for control systems","author":"Miloevi","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2444031"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2310254"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1981.316883"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6509490\/10684293\/10319845-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/10684293\/10319845.pdf?arnumber=10319845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T18:33:25Z","timestamp":1738607605000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10319845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":56,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2023.3333392","relation":{},"ISSN":["2325-5870","2372-2533"],"issn-type":[{"value":"2325-5870","type":"electronic"},{"value":"2372-2533","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}