{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T16:18:07Z","timestamp":1775060287358,"version":"3.50.1"},"reference-count":26,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Control Optim."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1137\/21m139044x","type":"journal-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T15:54:12Z","timestamp":1645804452000},"page":"545-574","source":"Crossref","is-referenced-by-count":11,"title":["How to Detect a Salami Slicer: A Stochastic Controller-and-Stopper Game with Unknown Competition"],"prefix":"10.1137","volume":"60","author":[{"given":"Erik","family":"Ekstr\u00f6m","sequence":"first","affiliation":[]},{"given":"Kristoffer","family":"Lindensj\u00f6","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"Olofsson","sequence":"additional","affiliation":[]}],"member":"351","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1137\/130950331"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-020-01718-6"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-008-9042-0"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-013-9198-0"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1016\/j.spa.2014.09.015"},{"key":"atypb10","doi-asserted-by":"publisher","DOI":"10.1016\/j.spa.2020.05.005"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA7377"},{"key":"atypb14","first-page":"277","volume":"44","author":"Gensbittel F.","year":"2019","journal-title":"Math. Oper. Res."},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-017-0219-5"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-012-9175-z"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1137\/120891800"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.14.3.159"},{"key":"atypb19","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1765(90)90197-9"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1214\/13-AAP986"},{"key":"atypb22","doi-asserted-by":"publisher","DOI":"10.1016\/j.spa.2014.07.020"},{"key":"atypb23","first-page":"02","volume":"07","author":"Kabay M. E.","journal-title":"Network World Security Newsletter"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4149(95)00002-O"},{"key":"atypb25","first-page":"105","author":"Karatzas I.","year":"2012","journal-title":"NJ"},{"key":"atypb27","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1015345598"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1214\/07-AOP367"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-016-9389-6"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1080\/17442508.2012.655279"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(87)90113-X"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1214\/14-AAP1054"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1214\/19-AAP1533"},{"key":"atypb37","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729093"}],"container-title":["SIAM Journal on Control and Optimization"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T22:14:13Z","timestamp":1646086453000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/21M139044X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["10.1137\/21M139044X"],"URL":"https:\/\/doi.org\/10.1137\/21m139044x","relation":{},"ISSN":["0363-0129","1095-7138"],"issn-type":[{"value":"0363-0129","type":"print"},{"value":"1095-7138","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2]]}}}