Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
DOI10.1016/J.EJOR.2016.12.034zbMATH Open1403.91217OpenAlexW2562157208MaRDI QIDQ1753471FDOQ1753471
Authors: Anna Nagurney, Shivani Shukla
Publication date: 29 May 2018
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2016.12.034
Recommendations
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- A differential game approach to information security investment under hackers' knowledge dissemination
- Equilibrium investments to cybersecurity of supply chain network
Applications of game theory (91A80) Auctions, bargaining, bidding and selling, and other market models (91B26) Production theory, theory of the firm (91B38)
Cites Work
- Non-cooperative games
- Equilibrium points in n -person games
- The bargaining problem
- Title not available (Why is that?)
- Title not available (Why is that?)
- Two-Person Cooperative Games
- Dynamical systems and variational inequalities
- Game-theoretic analysis of cooperation among supply chain agents: Review and extensions
- Interdependent security
- Collusive game solutions via optimization
- Game theory meets network security and privacy
- Nash equilibria of over-the-counter bargaining for insurance risk redistributions: the role of a regulator
- Title not available (Why is that?)
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Computation, Cryptography, and Network Security
Cited In (17)
- Title not available (Why is that?)
- Structural models for fog computing based Internet of things architectures with insurance and risk management applications
- A two-period game theoretic model of zero-day attacks with stockpiling
- A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands
- Risk assessment uncertainties in cybersecurity investments
- An optimal group decision-making approach for cyber security using improved selection-drift dynamics
- Vine copula modeling dependence among cyber risks: a dangerous regulatory paradox
- A network model for minimizing the total organ transplant costs
- Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers
- Establishing evolutionary game models for cyber security information exchange (CYBEX)
- An optimization model for the management of green areas
- Strategic discovery and sharing of vulnerabilities in competitive environments
- Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment
- Multivariate dependence among cyber risks based on \(L\)-hop propagation
- An equilibrium model of the supply chain network under multi-attribute behaviors analysis
This page was built for publication: Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753471)