Defensive Configuration for Multi-Agent Perimeter Monitoring | IEEE Conference Publication | IEEE Xplore