Network design and defence
DOI10.1016/J.GEB.2012.12.007zbMATH Open1281.91044OpenAlexW2052597240MaRDI QIDQ2636766FDOQ2636766
Authors: Marcin Dziubiński, Sanjeev Goyal
Publication date: 18 February 2014
Published in: Games and Economic Behavior (Search for Journal in Brave)
Full work available at URL: https://www.repository.cam.ac.uk/handle/1810/244868
Recommendations
Deterministic network models in operations research (90B10) Small world graphs, complex networks (graph-theoretic aspects) (05C82) 2-person games (91A05) Other game-theoretic models (91A40) Games involving graphs (91A43)
Cites Work
- A strategic model of social and economic networks
- Social and economic networks.
- Synthesis of reliable networks - a survey
- Design of Survivable Networks: A survey
- Connections. An introduction to the economics of networks.
- Complex social networks.
- The Organization of Decentralized Information Processing
- Security and Game Theory
- Title not available (Why is that?)
- How to Organize Crime1
- THE MAXIMUM CONNECTIVITY OF A GRAPH
- The Firm as a Communication Network
- Weakest-link attacker-defender games with multiple attack technologies
Cited In (20)
- Attacking and defending multiple valuable secrets in a big data world
- Survivable network design under optimal and heuristic interdiction scenarios
- Saddle functions and robust sets of equilibria
- A game of hide and seek in networks
- Determinants of equilibrium selection in network formation: an experiment
- Network disruption and the common-enemy effect
- Swap equilibria under link and vertex destruction
- Targeting the key player: an incentive-based approach
- Securing infrastructure facilities: when does proactive defense help?
- A note on connectivity and stability in dynamic network formation
- A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game
- Attack and interception in networks
- Network connectivity under node failure
- How Do You Defend a Network?
- An iterative security game for computing robust and adaptive network flows
- The critical node game
- Optimal design and defense of networks under link attacks
- How to preempt attacks in multi-front conflict with limited resources
- Network Elicitation in Adversarial Environment
- How do you defend a network?
This page was built for publication: Network design and defence
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2636766)