Interdependent security

From MaRDI portal
Publication:1404269


DOI10.1023/A:1024119208153zbMath1040.91062MaRDI QIDQ1404269

Geoffrey Heal, Howard C. Kunreuther

Publication date: 21 August 2003

Published in: Journal of Risk and Uncertainty (Search for Journal in Brave)


91B38: Production theory, theory of the firm


Related Items

How Do You Defend a Network?, The strategic interaction between a company and the government surrounding disasters, Learning in games with risky payoffs, Subsidization to induce tipping, Defending against multiple different attackers, Interdependent defense games with applications to internet security at the level of autonomous systems, Group cooperation under uncertainty, Private investment and government protection, Self-protection and insurance with interdependencies, False targets efficiency in defense strategy, Non-convexities and the gains from concealing defenses from committed terrorists, Separation in homogeneous systems with independent identical elements, Security investment, hacking, and information sharing between firms and between hackers, Total reward semi-Markov mean-field games with complementarity properties, Defense and attack for interdependent systems, Defense and attack of performance-sharing common bus systems, Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability, Strategic multiway cut and multicut games, How to preempt attacks in multi-front conflict with limited resources, Deep reinforcement learning for \textsf{FlipIt} security game, Protection in numbers? Self-protection as a local public good, Cybersecurity investments in the supply chain: coordination and a strategic attacker, An efficient dynamic allocation mechanism for security in networks of interdependent strategic agents, Catastrophe insurance equilibrium with correlated claims, Individual security, contagion, and network design, How many attackers can selfish defenders catch?, Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption, Strategic defense and attack for series and parallel reliability systems, Coordination of strategic responses to security threats: Laboratory evidence, Inoculation strategies for victims of viruses and the sum-of-squares partition problem, On influence, stable behavior, and the most influential individuals in networks: a game-theoretic approach, Defense against an opportunistic challenger: theory and experiments, Multivariate dependence among cyber risks based on \(L\)-hop propagation, Resilient Distributed Control of Multi-agent Cyber-Physical Systems, Protecting complex infrastructures against multiple strategic attackers, Aegis A Novel Cyber-Insurance Model, Modeling Internet Security Investments: Tackling Topological Information Uncertainty