Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
From MaRDI portal
Publication:1753471
DOI10.1016/j.ejor.2016.12.034zbMath1403.91217OpenAlexW2562157208MaRDI QIDQ1753471
Publication date: 29 May 2018
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2016.12.034
Applications of game theory (91A80) Production theory, theory of the firm (91B38) Auctions, bargaining, bidding and selling, and other market models (91B26)
Related Items (10)
Multivariate dependence among cyber risks based on \(L\)-hop propagation ⋮ An optimization model for the management of green areas ⋮ An equilibrium model of the supply chain network under multi-attribute behaviors analysis ⋮ Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers ⋮ A two-period game theoretic model of zero-day attacks with stockpiling ⋮ A network model for minimizing the total organ transplant costs ⋮ Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker ⋮ Cybersecurity investments in the supply chain: coordination and a strategic attacker ⋮ A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands ⋮ Structural models for fog computing based Internet of things architectures with insurance and risk management applications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Nash equilibria of over-the-counter bargaining for insurance risk redistributions: the role of a regulator
- Dynamical systems and variational inequalities
- Interdependent security
- Game-theoretic analysis of cooperation among supply chain agents: Review and extensions
- Collusive game solutions via optimization
- Non-cooperative games
- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
- Game theory meets network security and privacy
- The Bargaining Problem
- Computation, Cryptography, and Network Security
- Equilibrium points in n -person games
- Two-Person Cooperative Games
This page was built for publication: Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability