Interdependent defense games with applications to internet security at the level of autonomous systems
DOI10.3390/G8010013zbMATH Open1407.91064DBLPjournals/games/ChanCO17OpenAlexW2587876756WikidataQ60106436 ScholiaQ60106436MaRDI QIDQ725097FDOQ725097
Hau Chan, Michael Ceyko, Luis E. Ortiz
Publication date: 1 August 2018
Published in: Games (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/g8010013
Recommendations
equilibrium computationcomputational game theoryinterdependent securitylearning in gamesfully polynomial-time approximation schemeautonomous-systems internet security applicationequilibrium characterization
Applications of graph theory (05C90) Dynamic programming (90C39) Games involving graphs (91A43) Internet topics (68M11) Rationality and learning in game theory (91A26)
Cites Work
- Title not available (Why is that?)
- Elements of Information Theory
- Non-cooperative games
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Theory and Statistical Mechanics
- Game theoretic risk analysis of security threats
- Subjectivity and correlation in randomized strategies
- Quantal response equilibria for normal form games
- Correlated Equilibrium as an Expression of Bayesian Rationality
- Title not available (Why is that?)
- A random polynomial-time algorithm for approximating the volume of convex bodies
- Title not available (Why is that?)
- The Complexity of Computing a Nash Equilibrium
- Title not available (Why is that?)
- New complexity results about Nash equilibria
- On the complexity of the parity argument and other inefficient proofs of existence
- Interdependent security
- Settling the complexity of computing two-player Nash equilibria
- Cascading behavior in networks: algorithmic and economic issues
- Graphical games
- Title not available (Why is that?)
- On influence, stable behavior, and the most influential individuals in networks: a game-theoretic approach
- Nash and correlated equilibria: Some complexity considerations
- Title not available (Why is that?)
- Computing optimal randomized resource allocations for massive security games
- Uncertainty in Interdependent Security Games
- A strategic analysis of the war against transnational terrorism
- Graphical models for optimal power flow
Cited In (4)
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Cyber-physical correlation effects in defense games for large discrete infrastructures
- Interdependent Security Games on Networks Under Behavioral Probability Weighting
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue
This page was built for publication: Interdependent defense games with applications to internet security at the level of autonomous systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q725097)