The following pages link to How do you defend a network? (Q4682761):
Displaying 10 items.
- Targeting the key player: an incentive-based approach (Q1633660) (← links)
- Determinants of equilibrium selection in network formation: an experiment (Q1712158) (← links)
- How to preempt attacks in multi-front conflict with limited resources (Q2083980) (← links)
- A game of hide and seek in networks (Q2220931) (← links)
- Securing infrastructure facilities: when does proactive defense help? (Q2292114) (← links)
- Attacking and defending multiple valuable secrets in a big data world (Q2327644) (← links)
- Information acquisition and use by networked players (Q2419601) (← links)
- Equilibrium characterization and shock propagation in conflict networks (Q2682018) (← links)
- Network disruption and the common-enemy effect (Q2689417) (← links)
- Attack and interception in networks (Q6180414) (← links)