Interdependent security

From MaRDI portal
Publication:1404269

DOI10.1023/A:1024119208153zbMath1040.91062MaRDI QIDQ1404269

Geoffrey Heal, Howard C. Kunreuther

Publication date: 21 August 2003

Published in: Journal of Risk and Uncertainty (Search for Journal in Brave)



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (37)

Individual security, contagion, and network designThe strategic interaction between a company and the government surrounding disastersDefense against an opportunistic challenger: theory and experimentsGroup cooperation under uncertaintyPrivate investment and government protectionSecurity investment, hacking, and information sharing between firms and between hackersResilient Distributed Control of Multi-agent Cyber-Physical SystemsMultivariate dependence among cyber risks based on \(L\)-hop propagationSubsidization to induce tippingLearning in games with risky payoffsStrategic multiway cut and multicut gamesTotal reward semi-Markov mean-field games with complementarity propertiesHow many attackers can selfish defenders catch?Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emptionSelf-protection and insurance with interdependenciesStrategic defense and attack for series and parallel reliability systemsCoordination of strategic responses to security threats: Laboratory evidenceProtection in numbers? Self-protection as a local public goodFalse targets efficiency in defense strategyDefense and attack for interdependent systemsDefense and attack of performance-sharing common bus systemsMultifirm models of cybersecurity investment competition vs. cooperation and network vulnerabilityNon-convexities and the gains from concealing defenses from committed terroristsDefending against multiple different attackersInterdependent defense games with applications to internet security at the level of autonomous systemsInoculation strategies for victims of viruses and the sum-of-squares partition problemCybersecurity investments in the supply chain: coordination and a strategic attackerOn influence, stable behavior, and the most influential individuals in networks: a game-theoretic approachAn efficient dynamic allocation mechanism for security in networks of interdependent strategic agentsProtecting complex infrastructures against multiple strategic attackersAegis A Novel Cyber-Insurance ModelModeling Internet Security Investments: Tackling Topological Information UncertaintyHow to preempt attacks in multi-front conflict with limited resourcesSeparation in homogeneous systems with independent identical elementsDeep reinforcement learning for \textsf{FlipIt} security gameHow Do You Defend a Network?Catastrophe insurance equilibrium with correlated claims




This page was built for publication: Interdependent security