Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
From MaRDI portal
(Redirected from Publication:1753471)
Recommendations
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- A differential game approach to information security investment under hackers' knowledge dissemination
- Equilibrium investments to cybersecurity of supply chain network
Cites work
- scientific article; zbMATH DE number 3716008 (Why is no real title available?)
- scientific article; zbMATH DE number 3614533 (Why is no real title available?)
- scientific article; zbMATH DE number 1323215 (Why is no real title available?)
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Collusive game solutions via optimization
- Computation, Cryptography, and Network Security
- Dynamical systems and variational inequalities
- Equilibrium points in n -person games
- Game theory meets network security and privacy
- Game-theoretic analysis of cooperation among supply chain agents: Review and extensions
- Interdependent security
- Nash equilibria of over-the-counter bargaining for insurance risk redistributions: the role of a regulator
- Non-cooperative games
- The bargaining problem
- Two-Person Cooperative Games
Cited in
(17)- scientific article; zbMATH DE number 6613302 (Why is no real title available?)
- Structural models for fog computing based Internet of things architectures with insurance and risk management applications
- A two-period game theoretic model of zero-day attacks with stockpiling
- Risk assessment uncertainties in cybersecurity investments
- A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands
- An optimal group decision-making approach for cyber security using improved selection-drift dynamics
- Vine copula modeling dependence among cyber risks: a dangerous regulatory paradox
- A network model for minimizing the total organ transplant costs
- Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers
- Establishing evolutionary game models for cyber security information exchange (CYBEX)
- Strategic discovery and sharing of vulnerabilities in competitive environments
- An optimization model for the management of green areas
- Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment
- Multivariate dependence among cyber risks based on \(L\)-hop propagation
- An equilibrium model of the supply chain network under multi-attribute behaviors analysis
This page was built for publication: Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753471)