{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:17:16Z","timestamp":1773656236142,"version":"3.50.1"},"reference-count":12,"publisher":"Pleiades Publishing Ltd","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Remote Control"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1134\/s0005117916030115","type":"journal-article","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T00:46:48Z","timestamp":1459298808000},"page":"495-509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Equilibrium contained by counter-threats and complex equilibrium in secure strategies"],"prefix":"10.1134","volume":"77","author":[{"given":"M. B.","family":"Iskakov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. B.","family":"Iskakov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"137","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"17","key":"417_CR1","first-page":"181","volume":"1","author":"F.T. Aleskerov","year":"2013","unstructured":"Aleskerov, F.T., Game-Theoretic Modeling: An Attempt of Brief Discussion and a Forecast of Development, Zh. Novoi Econom. Assotsiatsii, 2013, no. 1(17), pp. 181\u2013184.","journal-title":"Zh. Novoi Econom. Assotsiatsii"},{"issue":"3","key":"417_CR2","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10513-005-0076-3","volume":"66","author":"M.B. Iskakov","year":"2005","unstructured":"Iskakov, M.B., Equilibrium in Safe Strategies, Autom. Remote Control, 2005, vol. 66, no. 3, pp. 465\u2013478.","journal-title":"Autom. Remote Control"},{"key":"417_CR3","volume-title":"Stimulirovanie v organizatsionnykh sistemakh (Stimulation in Organizational Systems)","author":"D.A. Novikov","year":"2003","unstructured":"Novikov, D.A., Stimulirovanie v organizatsionnykh sistemakh (Stimulation in Organizational Systems), Moscow: Sinteg, 2003."},{"issue":"2","key":"417_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/0022-0531(80)90006-X","volume":"23","author":"C. D\u2019Aspremont","year":"1980","unstructured":"D\u2019Aspremont, C. and G\u00e9rard-Varet, L.A., Stackelberg-solvable Games and Pre-Play Communication, J. Econom. Theory, 1980, vol. 23(2), pp. 201\u2013217.","journal-title":"J. Econom. Theory"},{"key":"417_CR5","first-page":"499","volume":"67","author":"J. Bertrand","year":"1883","unstructured":"Bertrand, J., Book review of theorie mathematique de la richesse sociale and of recherches sur les principles mathematiques de la theorie des richesses, J. Savants, 1883, vol. 67, pp. 499\u2013508.","journal-title":"J. Savants"},{"issue":"2","key":"417_CR6","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1134\/S0005117908020094","volume":"69","author":"M.B. Iskakov","year":"2008","unstructured":"Iskakov, M.B., Equilibrium in Safety Strategies and Equilibriums in Objections and Counter Objections in Noncooperative Games, Autom. Remote Control, 2008, vol. 69, no. 2, pp. 278\u2013298.","journal-title":"Autom. Remote Control"},{"key":"417_CR7","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.econlet.2012.04.097","volume":"117","author":"M. Iskakov","year":"2012","unstructured":"Iskakov, M. and Iskakov, A., Solution of the Hotelling\u2019s Game in Secure Strategies, Econom. Lett., 2012, vol. 117, pp. 115\u2013118.","journal-title":"Econom. Lett."},{"key":"417_CR8","volume-title":"Equilibrium in Secure Strategies, CORE Discussion Paper 2012\/61, Universit \u00e9 Catholique de Louvain","author":"M. Iskakov","year":"2012","unstructured":"Iskakov, M. and Iskakov, A., Equilibrium in Secure Strategies, CORE Discussion Paper 2012\/61, Universit \u00e9 Catholique de Louvain, Center for Operations Research and Econometrics (CORE), 2012."},{"key":"417_CR9","volume-title":"Equilibrium in Secure Strategies\u2014Intuitive Formulation","author":"M. Iskakov","year":"2012","unstructured":"Iskakov, M. and Iskakov, A., Equilibrium in Secure Strategies\u2014Intuitive Formulation, Working paper WP7\/2012\/06, National Research University Higher School of Economics, Moscow: Publishing House of the Higher School of Economics, 2012."},{"key":"417_CR10","volume-title":"Equilibria in Secure Strategies in the Tullock Contest, CORE Discussion Paper 2014\/10","author":"M. Iskakov","year":"2014","unstructured":"Iskakov, M., Iskakov, A., and Zakharov, A., Equilibria in Secure Strategies in the Tullock Contest, CORE Discussion Paper 2014\/10, Universit\u00e9 Catholique de Louvain, Center for Operations Research and Econometrics (CORE), 2014."},{"key":"417_CR11","volume-title":"Weakening of the Nash Equilibrium Concept: The Existence and Applications to the Hotelling Model","author":"M. Sandomirskaya","year":"2014","unstructured":"Sandomirskaya, M., Weakening of the Nash Equilibrium Concept: The Existence and Applications to the Hotelling Model, URL: http:\/\/ceshseru\/announcements\/122400243html (accessed September 7, 2014)."},{"key":"417_CR12","volume-title":"Marktform und Gleichgewicht","author":"H. Stackelberg","year":"1934","unstructured":"Stackelberg, H., Marktform und Gleichgewicht, Berlin: Springer, 1934."}],"container-title":["Automation and Remote Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0005117916030115.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0005117916030115","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0005117916030115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0005117916030115.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:29:09Z","timestamp":1773613749000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0005117916030115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["417"],"URL":"https:\/\/doi.org\/10.1134\/s0005117916030115","relation":{},"ISSN":["0005-1179","1608-3032"],"issn-type":[{"value":"0005-1179","type":"print"},{"value":"1608-3032","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3]]},"assertion":[{"value":"21 August 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2016","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}