{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T11:32:53Z","timestamp":1760441573520,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,19]]},"DOI":"10.1145\/3351917.3351924","type":"proceedings-article","created":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T12:10:23Z","timestamp":1569240623000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Applying a Bayesian Stackelberg game to secure infrastructure system"],"prefix":"10.1145","author":[{"given":"Xueqiang","family":"Gu","sequence":"first","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]},{"given":"Chengyi","family":"Zeng","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]},{"given":"Fengtao","family":"Xiang","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, Hunan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"685","volume-title":"7th Asia-Pacific Conference on Complex Systems","author":"Dekker Anthony H","year":"2004","unstructured":"Anthony H Dekker and Bernard Colbert . Scale-free networks and robustness of critical infrastructure networks . In 7th Asia-Pacific Conference on Complex Systems , pages 685 -- 699 . Citeseer , 2004 . Anthony H Dekker and Bernard Colbert. Scale-free networks and robustness of critical infrastructure networks. In 7th Asia-Pacific Conference on Complex Systems, pages 685--699. Citeseer, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1082161.1082168"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01401.x"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2010.01492.x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.09.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2009.01247.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2016.07.010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.07.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12569"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2017.11.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2017.07.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.09.019"},{"key":"e_1_3_2_1_13_1","volume-title":"Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics (NRL), 59(6):457--469","author":"Arce Daniel G","year":"2012","unstructured":"Daniel G Arce , Dan Kovenock , and Brian Roberson . Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics (NRL), 59(6):457--469 , 2012 . Daniel G Arce, Dan Kovenock, and Brian Roberson. Weakest-link attacker-defender games with multiple attack technologies. Naval Research Logistics (NRL), 59(6):457--469, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12569"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2017.04.022"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-017-2705-y"},{"key":"e_1_3_2_1_18_1","volume-title":"Applying a bayesian stackelberg game for securing a chemical plant. Journal of loss prevention in the process industries, 51:72--83","author":"Zhang Laobing","year":"2018","unstructured":"Laobing Zhang and Genserik Reniers . Applying a bayesian stackelberg game for securing a chemical plant. Journal of loss prevention in the process industries, 51:72--83 , 2018 . Laobing Zhang and Genserik Reniers. Applying a bayesian stackelberg game for securing a chemical plant. Journal of loss prevention in the process industries, 51:72--83, 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2017.03.039"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"e_1_3_2_1_21_1","volume-title":"Error and attack tolerance of complex networks. nature, 406(6794):378","author":"Albert R\u00e9ka","year":"2000","unstructured":"R\u00e9ka Albert , Hawoong Jeong , and Albert-L\u00e1szl\u00f3 Barab\u00e1si . Error and attack tolerance of complex networks. nature, 406(6794):378 , 2000 . R\u00e9ka Albert, Hawoong Jeong, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. Error and attack tolerance of complex networks. nature, 406(6794):378, 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5085850"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5029343"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.01.119"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1245581.1245586"},{"key":"e_1_3_2_1_26_1","first-page":"895","volume-title":"Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 2","author":"Paruchuri Praveen","year":"2008","unstructured":"Praveen Paruchuri , Jonathan P Pearce , Janusz Marecki , Milind Tambe , Fernando Ordonez , and Sarit Kraus . Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games . In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 2 , pages 895 -- 902 . International Foundation for Autonomous Agents and Multiagent Systems , 2008 . Praveen Paruchuri, Jonathan P Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez, and Sarit Kraus. Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 2, pages 895--902. International Foundation for Autonomous Agents and Multiagent Systems, 2008."},{"key":"e_1_3_2_1_27_1","volume-title":"Emergence of scaling in random networks. science, 286(5439):509--512","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","year":"1999","unstructured":"Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert . Emergence of scaling in random networks. science, 286(5439):509--512 , 1999 . Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert. Emergence of scaling in random networks. science, 286(5439):509--512, 1999."}],"event":{"name":"CACRE2019: 2019 4th International Conference on Automation, Control and Robotics Engineering","sponsor":["Sichuan University"],"location":"Shenzhen China","acronym":"CACRE2019"},"container-title":["Proceedings of the 2019 4th International Conference on Automation, Control and Robotics Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351917.3351924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351917.3351924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:17Z","timestamp":1750268957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351917.3351924"}},"subtitle":["from a complex network perspective"],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":27,"alternative-id":["10.1145\/3351917.3351924","10.1145\/3351917"],"URL":"https:\/\/doi.org\/10.1145\/3351917.3351924","relation":{},"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"2019-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}