{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:35:00Z","timestamp":1723012500322},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["71601158","71971176","71671016"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1016\/j.ress.2019.106651","type":"journal-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T01:40:36Z","timestamp":1568684436000},"page":"106651","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":20,"special_numbering":"C","title":["Defending a parallel system against a strategic attacker with redundancy, protection and disinformation"],"prefix":"10.1016","volume":"193","author":[{"given":"Rui","family":"Peng","sequence":"first","affiliation":[]},{"given":"Hui","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jianjun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.ress.2019.106651_bib0001","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1080\/0740817X.2012.689124","article-title":"n-Subpopulations experiencing stochastic degradation: reliability modeling, burn-in and preventive replacement optimization","volume":"45","author":"Xiang","year":"2013","journal-title":"IIE Trans"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0002","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.cie.2011.09.006","article-title":"Optimal maintenance policies for systems subject to a Markovian operating environment","volume":"62","author":"Xiang","year":"2012","journal-title":"Comput Ind Eng"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0003","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/S0951-8320(02)00008-X","article-title":"Reliability engineering and risk analysis: a practical guide","volume":"77","author":"Soares","year":"2002","journal-title":"Reliab Eng Syst Saf"},{"key":"10.1016\/j.ress.2019.106651_bib0004","series-title":"Maintenance theory of reliability","author":"Nakagawa","year":"2005"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0005","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TR.2006.884599","article-title":"Optimal defense strategy against intentional attacks","volume":"56","author":"Levitin","year":"2007","journal-title":"IEEE Trans Reliab"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0006","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.ress.2012.11.016","article-title":"Defending and attacking a network of two arcs subject to traffic congestion","volume":"112","author":"Bier","year":"2013","journal-title":"Reliab Eng Syst Saf"},{"issue":"4","key":"10.1016\/j.ress.2019.106651_bib0007","first-page":"533","article-title":"Modeling arbitrary layers of continuous-level defenses in facing with strategic attackers","volume":"31","author":"Mohsen","year":"2010","journal-title":"Risk Anal"},{"issue":"4","key":"10.1016\/j.ress.2019.106651_bib0008","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TR.2017.2759328","article-title":"Dynamic defense resource allocation for minimizing unsupplied demand in cyber-physical systems against uncertain attacks","volume":"66","author":"Mo","year":"2017","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"10.1016\/j.ress.2019.106651_bib0009","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TR.2009.2026814","article-title":"Redundancy vs. protection in defending parallel systems against unintentional and intentional impacts","volume":"58","author":"Levitin","year":"2009","journal-title":"IEEE Trans Reliab"},{"issue":"3","key":"10.1016\/j.ress.2019.106651_bib0010","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1080\/16843703.2014.11673350","article-title":"Maintenance versus individual and overarching protections for parallel systems","volume":"11","author":"Peng","year":"2014","journal-title":"Qual Technol Quant Manage"},{"issue":"6","key":"10.1016\/j.ress.2019.106651_bib0011","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/j.jaccpubpol.2006.09.001","article-title":"Income, interdependence, and substitution effects affecting incentives for security investment","volume":"25","author":"Hausken","year":"2006","journal-title":"J Account Public Policy"},{"key":"10.1016\/j.ress.2019.106651_bib0012","series-title":"Proceedings of the Institution of Mechanical Engineers Part O Journal of Risk & Reliability","article-title":"How companies and governments react to disasters","volume":"230","author":"Hausken","year":"2016"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0013","first-page":"297","article-title":"Stackelberg vs. Nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness","volume":"41","author":"Korzhyk","year":"2014","journal-title":"J Artif Intell Res"},{"issue":"3","key":"10.1016\/j.ress.2019.106651_bib0014","doi-asserted-by":"crossref","first-page":"962","DOI":"10.1016\/j.ejor.2016.06.059","article-title":"Defense and attack of performance-sharing common bus systems","volume":"256","author":"Zhai","year":"2016","journal-title":"Eur J Oper Res"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0015","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.ejor.2014.12.006","article-title":"Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks","volume":"243","author":"Mo","year":"2015","journal-title":"Eur J Oper Res"},{"issue":"3","key":"10.1016\/j.ress.2019.106651_bib0016","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1080\/0740817X.2012.676749","article-title":"Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information","volume":"45","author":"Zhang","year":"2013","journal-title":"IIE Trans"},{"key":"10.1016\/j.ress.2019.106651_bib0017","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ress.2017.08.002","article-title":"The role of risk preferences in a multi-target defender-attacker resource allocation game","volume":"169","author":"Zhang","year":"2018","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0018","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.ejor.2014.10.001","article-title":"Critical infrastructure protection using secrecy \u2013 a discrete simultaneous game","volume":"242","author":"Zhang","year":"2014","journal-title":"Eur J Oper Res"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/24725854.2017.1382749","article-title":"Incorporation risk preferences in stochastic noncooperative games","volume":"50","author":"Jose","year":"2017","journal-title":"IISE Trans"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0020","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1287\/deca.2017.0346","article-title":"Modeling a multitarget attacker\u2013defender game with budget constraints","volume":"14","author":"Guan","year":"2017","journal-title":"Decis Anal"},{"key":"10.1016\/j.ress.2019.106651_bib0021","series-title":"An effectiveness analysis of the tactical employment of decoys","author":"Blanks","year":"1994"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0022","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.ejor.2007.11.060","article-title":"False targets efficiency in defense strategy","volume":"194","author":"Levitin","year":"2009","journal-title":"Eur J Oper Res"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0023","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TR.2008.2011661","article-title":"Redundancy vs. protection vs. false targets for systems under attack","volume":"58","author":"Levitin","year":"2009","journal-title":"IEEE Trans Reliab"},{"issue":"5","key":"10.1016\/j.ress.2019.106651_bib0024","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.ress.2008.11.003","article-title":"Protection vs. false targets in series systems","volume":"94","author":"Hausken","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"issue":"7","key":"10.1016\/j.ress.2019.106651_bib0025","first-page":"1","article-title":"Deterrence and risk preferences in sequential attacker-defender games with continuous efforts","volume":"37","author":"Payappalli","year":"2017","journal-title":"Risk Anal"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0026","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3751\/71.1.15","article-title":"The logic and illogic of an israeli unilateral preventive strike on iran","volume":"71","author":"Merom","year":"2017","journal-title":"Middle East J"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0027","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TR.2018.2847281","article-title":"Defense resource allocation against sequential unintentional and intentional impacts","volume":"68","author":"Peng","year":"2018","journal-title":"IEEE Trans Reliab"},{"issue":"12","key":"10.1016\/j.ress.2019.106651_bib0028","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1016\/j.ress.2011.07.012","article-title":"Is it wise to protect false targets?","volume":"96","author":"Levitin","year":"2011","journal-title":"Reliab Eng Syst Saf"},{"issue":"112","key":"10.1016\/j.ress.2019.106651_bib0029","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ress.2012.11.015","article-title":"Is it wise to leave some false targets unprotected?","volume":"112","author":"Levitin","year":"2013","journal-title":"ReliabEng Syst Saf"},{"issue":"6","key":"10.1016\/j.ress.2019.106651_bib0030","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/j.ress.2010.02.008","article-title":"Defending simple series and parallel systems with imperfect false targets","volume":"95","author":"Peng","year":"2010","journal-title":"Reliab Eng Syst Saf"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0031","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1057\/jors.2009.171","article-title":"Optimal defence of single object with imperfect false targets","volume":"62","author":"Peng","year":"2011","journal-title":"J Oper Res Soc"},{"issue":"12","key":"10.1016\/j.ress.2019.106651_bib0032","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.1016\/j.ress.2009.06.010","article-title":"Intelligence and impact contests in systems with redundancy, false targets, and partial protection","volume":"94","author":"Levitin","year":"2009","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0033","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/14751790902985181","article-title":"Intelligence and impact contests in systems with fake targets","volume":"25","author":"Levitin","year":"2009","journal-title":"Defense Secur Anal"},{"key":"10.1016\/j.ress.2019.106651_bib0034","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.01.002","article-title":"Defending a single object against an attacker trying to detect a subset of false targets","volume":"149","author":"Peng","year":"2016","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"10.1016\/j.ress.2019.106651_bib0035","first-page":"23","article-title":"Choosing what to protect when attacker resources and asset valuations are uncertain","volume":"24","author":"Hausken","year":"2014","journal-title":"Oper Res Decis"},{"issue":"1","key":"10.1016\/j.ress.2019.106651_bib0036","first-page":"31","article-title":"Secrecy in defensive allocations as a strategy for achieving more cost-effective attacker deterrence","volume":"5","author":"Dighe","year":"2009","journal-title":"Int J Performability Eng"},{"issue":"2","key":"10.1016\/j.ress.2019.106651_bib0037","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/BF01213906","article-title":"Contest success functions","volume":"7","author":"Skaperdas","year":"1996","journal-title":"Econ Theory"},{"key":"10.1016\/j.ress.2019.106651_bib0038","series-title":"Efficient rent-seeking","author":"Tullock","year":"2001"},{"key":"10.1016\/j.ress.2019.106651_bib0039","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s11127-005-1717-3","article-title":"Production and conflict models versus rent-seeking models","volume":"123","author":"Hausken","year":"2005","journal-title":"Public Choice"}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832018314686?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832018314686?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T10:16:42Z","timestamp":1574504202000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832018314686"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":39,"alternative-id":["S0951832018314686"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2019.106651","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2020,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Defending a parallel system against a strategic attacker with redundancy, protection and disinformation","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2019.106651","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106651"}}