Network security and contagion
From MaRDI portal
Publication:337833
DOI10.1016/J.JET.2016.09.009zbMATH Open1372.91086OpenAlexW2530951629MaRDI QIDQ337833FDOQ337833
Authors: Daron Acemoglu, Azarakhsh Malekian, Asu Ozdaglar
Publication date: 3 November 2016
Published in: Journal of Economic Theory (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1721.1/119662
Recommendations
Random graphs (graph-theoretic aspects) (05C80) Social networks; opinion dynamics (91D30) Games involving graphs (91A43)
Cites Work
- Who's Who in Networks. Wanted: The Key Player
- Peer effects and social networks in education
- A strategic model of social and economic networks
- Social and economic networks.
- Connected components in random graphs with given expected degree sequences
- Network games
- Existence and Uniqueness of Equilibrium Points for Concave N-Person Games
- A Noncooperative Model of Network Formation
- How homophily affects the speed of learning and best-response dynamics
- Complex social networks.
- Public goods in networks
- Dividing a Graph into Triconnected Components
- The Size of the Giant Component of a Random Graph with a Given Degree Sequence
- How to Organize Crime1
- Quantitative Guidelines for Communicable Disease Control Program: A Complete Synthesis
- Attack, Defence, and Contagion in Networks
- On the private provision of public goods on networks
Cited In (24)
- Virus dynamics with behavioral responses
- Social interactions and the prophylaxis of SI epidemics on networks
- Contagion Source Detection in Epidemic and Infodemic Outbreaks: Mathematical Analysis and Network Algorithms
- Security investment over networks with bounded rational agents: analysis and distributed algorithm
- Individual security, contagion, and network design
- Attack against layered defense
- The cost of segregation in (social) networks
- Network disruption and the common-enemy effect
- Methods for removing links in a network to minimize the spread of infections
- Targeting the key player: an incentive-based approach
- Securing infrastructure facilities: when does proactive defense help?
- Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study
- Contagion exposure and protection technology
- How Do You Defend a Network?
- Contagion risks and security investment in directed networks
- Privacy-constrained network formation
- Security interdependencies for networked control systems with identical agents
- Epidemic spreading and equilibrium social distancing in heterogeneous networks
- Welfare targeting in networks
- Optimal design and defense of networks under link attacks
- Protecting shared information in networks: a network security game with strategic attacks
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue
- Network Elicitation in Adversarial Environment
- Investing in prevention or paying for recovery -- attitudes to cyber risk
This page was built for publication: Network security and contagion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q337833)