Network security and contagion
From MaRDI portal
Recommendations
Cites work
- A Noncooperative Model of Network Formation
- A strategic model of social and economic networks
- Attack, Defence, and Contagion in Networks
- Complex social networks.
- Connected components in random graphs with given expected degree sequences
- Dividing a Graph into Triconnected Components
- Existence and Uniqueness of Equilibrium Points for Concave N-Person Games
- How homophily affects the speed of learning and best-response dynamics
- How to Organize Crime1
- Network games
- On the private provision of public goods on networks
- Peer effects and social networks in education
- Public goods in networks
- Quantitative Guidelines for Communicable Disease Control Program: A Complete Synthesis
- Social and economic networks.
- The Size of the Giant Component of a Random Graph with a Given Degree Sequence
- Who's Who in Networks. Wanted: The Key Player
Cited in
(24)- Targeting the key player: an incentive-based approach
- Attack against layered defense
- Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms
- Investing in prevention or paying for recovery -- attitudes to cyber risk
- Contagion exposure and protection technology
- Security interdependencies for networked control systems with identical agents
- The cost of segregation in (social) networks
- Welfare targeting in networks
- Contagion risks and security investment in directed networks
- Protecting shared information in networks: a network security game with strategic attacks
- Privacy-constrained network formation
- Network disruption and the common-enemy effect
- Epidemic spreading and equilibrium social distancing in heterogeneous networks
- Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study
- How Do You Defend a Network?
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue
- Methods for removing links in a network to minimize the spread of infections
- Securing infrastructure facilities: when does proactive defense help?
- Network Elicitation in Adversarial Environment
- Virus dynamics with behavioral responses
- Social interactions and the prophylaxis of SI epidemics on networks
- Individual security, contagion, and network design
- Optimal design and defense of networks under link attacks
- Security investment over networks with bounded rational agents: analysis and distributed algorithm
This page was built for publication: Network security and contagion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q337833)