A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability
From MaRDI portal
Publication:2790439
DOI10.1007/978-3-319-18275-9_16zbMath1382.90015OpenAlexW2286305083MaRDI QIDQ2790439
Ladimer S. Nagurney, Anna Nagurney, Shivani Shukla
Publication date: 4 March 2016
Published in: Computation, Cryptography, and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-18275-9_16
game theoryvariational inequalitiesNash equilibriumsupply chainsinvestmentscybersecuritynetwork vulnerability
Applications of game theory (91A80) Transportation, logistics and supply chain management (90B06) Complementarity and equilibrium problems and variational inequalities (finite dimensions) (aspects of mathematical programming) (90C33) Cryptography (94A60)
Related Items
Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers ⋮ A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints ⋮ Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability ⋮ A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands
Cites Work