Attack, Defence, and Contagion in Networks
From MaRDI portal
Publication:4610693
Recommendations
- Attacks and cascades in complex networks.
- Attack propagation in networks
- Attack and defense strategies in complex networks based on game theory
- Contagion in networks: stability and efficiency
- Individual security, contagion, and network design
- Optimal response to epidemics and cyber attacks in networks
- Dynamical resilience of networks against targeted attack
Cited in
(27)- Determinants of equilibrium selection in network formation: an experiment
- A game of hide and seek in networks
- Individual security, contagion, and network design
- Network disruption and the common-enemy effect
- Effort discrimination and curvature of contest technology in conflict networks
- A Theory of Network Security: Principles of Natural Selection and Combinatorics
- Equilibrium characterization and shock propagation in conflict networks
- Strategic network formation with attack and immunization
- On the Power of Planned Infections in Networks
- Optimal control of networks in the presence of attackers and defenders
- Securing infrastructure facilities: when does proactive defense help?
- A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game
- A note on connectivity and stability in dynamic network formation
- Attack and interception in networks
- Cascade defense via control of the fluxes in complex networks
- Network inspection for detecting strategic attacks
- Network security and contagion
- Network connectivity under node failure
- How Do You Defend a Network?
- Communities, Random Walks, and Social Sybil Defense
- The critical node game
- Contests on networks
- Optimal design and defense of networks under link attacks
- Norms and the evolution of leaders' followership
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue
- The network origins of the gains from trade
- Thresholds in the resilience of modular social networks to invasion by defectors
This page was built for publication: Attack, Defence, and Contagion in Networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4610693)