Interdependent security
From MaRDI portal
Publication:1404269
DOI10.1023/A:1024119208153zbMath1040.91062MaRDI QIDQ1404269
Geoffrey Heal, Howard C. Kunreuther
Publication date: 21 August 2003
Published in: Journal of Risk and Uncertainty (Search for Journal in Brave)
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (37)
Individual security, contagion, and network design ⋮ The strategic interaction between a company and the government surrounding disasters ⋮ Defense against an opportunistic challenger: theory and experiments ⋮ Group cooperation under uncertainty ⋮ Private investment and government protection ⋮ Security investment, hacking, and information sharing between firms and between hackers ⋮ Resilient Distributed Control of Multi-agent Cyber-Physical Systems ⋮ Multivariate dependence among cyber risks based on \(L\)-hop propagation ⋮ Subsidization to induce tipping ⋮ Learning in games with risky payoffs ⋮ Strategic multiway cut and multicut games ⋮ Total reward semi-Markov mean-field games with complementarity properties ⋮ How many attackers can selfish defenders catch? ⋮ Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption ⋮ Self-protection and insurance with interdependencies ⋮ Strategic defense and attack for series and parallel reliability systems ⋮ Coordination of strategic responses to security threats: Laboratory evidence ⋮ Protection in numbers? Self-protection as a local public good ⋮ False targets efficiency in defense strategy ⋮ Defense and attack for interdependent systems ⋮ Defense and attack of performance-sharing common bus systems ⋮ Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability ⋮ Non-convexities and the gains from concealing defenses from committed terrorists ⋮ Defending against multiple different attackers ⋮ Interdependent defense games with applications to internet security at the level of autonomous systems ⋮ Inoculation strategies for victims of viruses and the sum-of-squares partition problem ⋮ Cybersecurity investments in the supply chain: coordination and a strategic attacker ⋮ On influence, stable behavior, and the most influential individuals in networks: a game-theoretic approach ⋮ An efficient dynamic allocation mechanism for security in networks of interdependent strategic agents ⋮ Protecting complex infrastructures against multiple strategic attackers ⋮ Aegis A Novel Cyber-Insurance Model ⋮ Modeling Internet Security Investments: Tackling Topological Information Uncertainty ⋮ How to preempt attacks in multi-front conflict with limited resources ⋮ Separation in homogeneous systems with independent identical elements ⋮ Deep reinforcement learning for \textsf{FlipIt} security game ⋮ How Do You Defend a Network? ⋮ Catastrophe insurance equilibrium with correlated claims
This page was built for publication: Interdependent security