Individual security, contagion, and network design
From MaRDI portal
Publication:2359387
DOI10.1016/j.jet.2017.05.006zbMath1400.91113OpenAlexW2616535084MaRDI QIDQ2359387
Sanjeev Goyal, Marcin Dziubiński, Diego A. Cerdeiro
Publication date: 28 June 2017
Published in: Journal of Economic Theory (Search for Journal in Brave)
Full work available at URL: https://www.repository.cam.ac.uk/handle/1810/265233
Applications of graph theory (05C90) Communication networks in operations research (90B18) Games involving graphs (91A43)
Related Items (6)
Network Elicitation in Adversarial Environment ⋮ Contagion exposure and protection technology ⋮ Attack and interception in networks ⋮ Network disruption and the common-enemy effect ⋮ A game of hide and seek in networks ⋮ How Do You Defend a Network?
Cites Work
- Unnamed Item
- Network security and contagion
- Economics of information security.
- Interdependent security
- Inoculation strategies for victims of viruses and the sum-of-squares partition problem
- Strategic Network Formation with Attack and Immunization
- How to Organize Crime1
- Attack, Defence, and Contagion in Networks
This page was built for publication: Individual security, contagion, and network design