Attacking and defending multiple valuable secrets in a big data world
From MaRDI portal
Publication:2327644
DOI10.1016/j.ejor.2019.07.064zbMath1431.91076OpenAlexW2965438782WikidataQ127406538 ScholiaQ127406538MaRDI QIDQ2327644
Publication date: 15 October 2019
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: http://www.tax.mpg.de/RePEc/mpi/wpaper/TAX-MPG-RPS-2019-05.pdf
Related Items
Cyber deterrence with imperfect attribution and unverifiable signaling, Skills, Efficiency, and Timing in a Simple Attack and Defense Model, How to preempt attacks in multi-front conflict with limited resources
Cites Work
- Unnamed Item
- Unnamed Item
- Defending against multiple different attackers
- Monopoly price discrimination and privacy: the hidden cost of hiding
- Defense and attack for interdependent systems
- The all-pay auction with complete information
- Network design and defence
- Weakest-link attacker-defender games with multiple attack technologies
- How do you defend a network?
- Group Contests with Internal Conflict and Power Asymmetry