A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
DOI10.1007/S10479-016-2209-1zbMATH Open1403.90042OpenAlexW2343984271MaRDI QIDQ513575FDOQ513575
Authors: Anna Nagurney, Patrizia Daniele, Shivani Shukla
Publication date: 7 March 2017
Published in: Annals of Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10479-016-2209-1
Recommendations
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Equilibrium investments to cybersecurity of supply chain network
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers
- A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands
game theoryNash equilibriumvariational inequalitiesinformation asymmetryinvestmentscybersecuritysupply chain network vulnerability
Management decision making, including multiple objectives (90B50) Noncooperative games (91A10) Complementarity and equilibrium problems and variational inequalities (finite dimensions) (aspects of mathematical programming) (90C33) Inventory, storage, reservoirs (90B05)
Cites Work
- Non-cooperative games
- Equilibrium points in n -person games
- Multiuser optimization: distributed algorithms and error analysis
- Title not available (Why is that?)
- Dynamical systems and variational inequalities
- Projected dynamical systems and variational inequalities with applications
- Game theory meets network security and privacy
- Dynamic networks and evolutionary variational inequalities
- A variational inequality formulation of equilibrium models for end-of-life products with nonlinear constraints
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Computation, Cryptography, and Network Security
Cited In (23)
- A complementarity model and algorithm for direct multi-commodity flow supply chain network equilibrium problem
- Equilibrium conditions of a logistics service supply chain with a new smoothing algorithm
- Matrix games with 2-tuple linguistic information
- A projected dynamic system associated with a cybersecurity investment model with budget constraints and fixed demands
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Sustainable management of remanufacturing in dynamic supply chains
- Equilibrium investments to cybersecurity of supply chain network
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- A complementarity model and algorithm for multi-commodity flow supply chain network equilibrium with random demands
- A variational inequality formulation for designing a multi-echelon, multi-product supply chain network in a competitive environment
- Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- A supply chain network economic model with time-based competition
- Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers
- Multi-layer 5G network slicing with UAVs: an optimization model
- A mathematical network model and a solution algorithm for IaaS cloud computing
- A product service supply chain network equilibrium considering risk management in the context of COVID-19 pandemic
- Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
- Innovative supply chain optimization models with multiple uncertainty factors
- To pool or not to pool in carbon quotas: analyses of emission regulation and operations in supply chain supernetwork under cap-and-trade policy
- An optimization model for service requests management in a 5G network architecture
- Evaluating the effects of environmental regulations on a closed-loop supply chain network: a variational inequality approach
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
This page was built for publication: A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q513575)