Attack, Defence, and Contagion in Networks
From MaRDI portal
Publication:4610693
DOI10.1093/RESTUD/RDU013zbMATH Open1405.91074OpenAlexW2013228821MaRDI QIDQ4610693FDOQ4610693
Authors: Sanjeev Goyal, Adrien Vigier
Publication date: 23 January 2019
Published in: Review of Economic Studies (Search for Journal in Brave)
Full work available at URL: https://nottingham-repository.worktribe.com/output/4920408
Recommendations
- Attacks and cascades in complex networks.
- Attack propagation in networks
- Attack and defense strategies in complex networks based on game theory
- Contagion in networks: stability and efficiency
- Individual security, contagion, and network design
- Optimal response to epidemics and cyber attacks in networks
- Dynamical resilience of networks against targeted attack
Epidemiology (92D30) Deterministic network models in operations research (90B10) 2-person games (91A05) Games involving graphs (91A43) Authentication, digital signatures and secret sharing (94A62)
Cited In (27)
- A game of hide and seek in networks
- Individual security, contagion, and network design
- Determinants of equilibrium selection in network formation: an experiment
- Effort discrimination and curvature of contest technology in conflict networks
- Network disruption and the common-enemy effect
- A Theory of Network Security: Principles of Natural Selection and Combinatorics
- Equilibrium characterization and shock propagation in conflict networks
- On the Power of Planned Infections in Networks
- Optimal control of networks in the presence of attackers and defenders
- Strategic network formation with attack and immunization
- Securing infrastructure facilities: when does proactive defense help?
- A note on connectivity and stability in dynamic network formation
- A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game
- Attack and interception in networks
- Cascade defense via control of the fluxes in complex networks
- Network inspection for detecting strategic attacks
- Network security and contagion
- Network connectivity under node failure
- How Do You Defend a Network?
- Communities, Random Walks, and Social Sybil Defense
- The critical node game
- Contests on networks
- Optimal design and defense of networks under link attacks
- Norms and the evolution of leaders' followership
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue
- The network origins of the gains from trade
- Thresholds in the resilience of modular social networks to invasion by defectors
This page was built for publication: Attack, Defence, and Contagion in Networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4610693)