The following pages link to Interdependent security (Q1404269):
Displaying 39 items.
- The strategic interaction between a company and the government surrounding disasters (Q285988) (← links)
- Learning in games with risky payoffs (Q417709) (← links)
- Subsidization to induce tipping (Q621717) (← links)
- Defending against multiple different attackers (Q713120) (← links)
- Interdependent defense games with applications to internet security at the level of autonomous systems (Q725097) (← links)
- Group cooperation under uncertainty (Q843714) (← links)
- Private investment and government protection (Q854776) (← links)
- Self-protection and insurance with interdependencies (Q928724) (← links)
- False targets efficiency in defense strategy (Q953438) (← links)
- Non-convexities and the gains from concealing defenses from committed terrorists (Q969478) (← links)
- Separation in homogeneous systems with independent identical elements (Q1046063) (← links)
- Security investment, hacking, and information sharing between firms and between hackers (Q1656936) (← links)
- Total reward semi-Markov mean-field games with complementarity properties (Q1707459) (← links)
- Defense and attack for interdependent systems (Q1752233) (← links)
- Defense and attack of performance-sharing common bus systems (Q1752280) (← links)
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability (Q1753471) (← links)
- Strategic multiway cut and multicut games (Q1946494) (← links)
- How to preempt attacks in multi-front conflict with limited resources (Q2083980) (← links)
- Deep reinforcement learning for \textsf{FlipIt} security game (Q2086680) (← links)
- Protection in numbers? Self-protection as a local public good (Q2237870) (← links)
- Cybersecurity investments in the supply chain: coordination and a strategic attacker (Q2282501) (← links)
- An efficient dynamic allocation mechanism for security in networks of interdependent strategic agents (Q2292109) (← links)
- Catastrophe insurance equilibrium with correlated claims (Q2353260) (← links)
- Individual security, contagion, and network design (Q2359387) (← links)
- How many attackers can selfish defenders catch? (Q2444551) (← links)
- Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption (Q2449366) (← links)
- Strategic defense and attack for series and parallel reliability systems (Q2462176) (← links)
- Coordination of strategic responses to security threats: Laboratory evidence (Q2463422) (← links)
- Inoculation strategies for victims of viruses and the sum-of-squares partition problem (Q2507699) (← links)
- On influence, stable behavior, and the most influential individuals in networks: a game-theoretic approach (Q2510117) (← links)
- Defense against an opportunistic challenger: theory and experiments (Q2630102) (← links)
- Multivariate dependence among cyber risks based on \(L\)-hop propagation (Q2665874) (← links)
- Resilient Distributed Control of Multi-agent Cyber-Physical Systems (Q2925514) (← links)
- Protecting complex infrastructures against multiple strategic attackers (Q3082642) (← links)
- Aegis A Novel Cyber-Insurance Model (Q3098100) (← links)
- Modeling Internet Security Investments: Tackling Topological Information Uncertainty (Q3098102) (← links)
- How Do You Defend a Network? (Q5022165) (← links)
- Stackelberg security games with contagious attacks on a network: reallocation to the rescue (Q6488790) (← links)
- The collective security dilemma of preemptive strikes (Q6555198) (← links)