{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:38:41Z","timestamp":1777952321070,"version":"3.51.4"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71671016"],"award-info":[{"award-number":["71671016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71231001"],"award-info":[{"award-number":["71231001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["FRF-GF-17-B14"],"award-info":[{"award-number":["FRF-GF-17-B14"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/tr.2018.2847281","type":"journal-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T19:01:25Z","timestamp":1530644485000},"page":"364-374","source":"Crossref","is-referenced-by-count":14,"title":["Defense Resource Allocation Against Sequential Unintentional and Intentional Impacts"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6596-0334","authenticated-orcid":false,"given":"Rui","family":"Peng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4996-587X","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6549-6906","authenticated-orcid":false,"given":"Qingqing","family":"Zhai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","first-page":"17","article-title":"Transitional dynamics in a Tullock contest with a general cost function","volume":"11","author":"maffei","year":"2017","journal-title":"B E J Theor Econ"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2008.06.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2003.09.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD.2011.5764062"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.07.006"},{"key":"ref12","first-page":"171","article-title":"Defense of homogeneous parallel multi-state systems subject to two sequential attacks","volume":"224","author":"hausken","year":"0","journal-title":"Proc Inst Mechan Engineers Part O J Risk Rel"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2008.2011661"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.02.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2009.171"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2016.01.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2012.676749"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.10.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.02.024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2015.01.036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.12.013"},{"key":"ref27","first-page":"206","article-title":"Redundancy and defense resource allocation algorithms to assure service continuity against natural disasters and intelligent attacks","author":"lin","year":"0","journal-title":"Proc Int Conf Broadband Wireless Comput Commun Appl"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2010.541178"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.884599"},{"key":"ref29","first-page":"97","article-title":"Efficient rent seeking","author":"tullock","year":"1980","journal-title":"In Toward a Theory of the Rent-Seeking Society"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2008.01090.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.01.019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2011.01657.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2008.01053.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.06.059"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2009.2026814"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"355","DOI":"10.23940\/ijpe.12.4.p355.mag","article-title":"Review of systems defense and attack models","volume":"8","author":"hausken","year":"2012","journal-title":"Int J Performability Eng"},{"key":"ref22","first-page":"223","article-title":"Probabilistic risk analysis versus decision analysis: Similarities, differences and illustrations. Uncertainty and risk: Mental, formal, experimental representations: Book series: Theory and decision series C game theory","volume":"41","author":"pate-cornell","year":"2007","journal-title":"Math Programm Oper Res"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.09.001"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-0-387-87767-9_4","article-title":"Defending against terrorism, natural disaster, and all hazards","author":"hausken","year":"2009","journal-title":"Game Theoretic Risk Analysis of Security Threats"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0434"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10109-006-0039-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1076-0342(2006)12:4(230)"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8656610\/08402143.pdf?arnumber=8402143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T22:44:06Z","timestamp":1720392246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8402143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":32,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2847281","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}