180
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Decentralized Defence of a (Directed) Network Structure

ORCID Icon
Pages 659-676 | Received 01 Aug 2017, Accepted 24 Feb 2019, Published online: 15 Mar 2019

References

  • Acemoglu, D., A. Malekian, and A. Ozdaglar. 2016. “Network Security and Contagion.” Journal of Economic Theory 166: 536–585. doi:10.1016/j.jet.2016.09.009.
  • Alpcan, T., and T. Başar. 2010. Network Security: A Decision and Game-Theoretic Approach. Cambridge, UK: Cambridge University Press, 2011.
  • Aspnes, J., K. Chang, and A. Yampolskiy. 2006. “Inoculation Strategies for Victims of Viruses and the Sum-Of-Squares Partition Problem.” Journal of Computer and System Sciences 72 (6): 1077–1093. doi:10.1016/j.jcss.2006.02.003.
  • Bier, V. 2006. “Game-theoretic and reliability methods in counterterrorism and security.” Statistical Methods in Counterterrorism. Springer, New York, NY, 2006. 23-40.
  • Bier, V., S. Oliveros, and L. Samuelson. 2007. “Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker.” Journal of Public Economic Theory 9 (4): 563–587. doi:10.1111/jpet.2007.9.issue-4.
  • Cerdeiro, D. A., M. Dziubiński, and S. Goyal. 2017. “Individual Security, Contagion, and Network Design.” Journal of Economic Theory 170: 182–226. doi:10.1016/j.jet.2017.05.006.
  • Dziubiński, M., and S. Goyal. 2017. “How Do You Defend a Network?” Theoretical Economics 12 (1): 331–376. doi:10.3982/TE2088.
  • Goyal, S., and A. Vigier. 2014. “Attack, Defence, and Contagion in Networks.” The Review of Economic Studies 81 (4): 1518–1542. doi:10.1093/restud/rdu013.
  • Heal, G., and H.  Kunreuther 2004. Interdependent security: A general model. No. w10706.”National Bureau of Economic Research, 2004.
  • Hong, S. 2011. Strategic Network Interdiction.
  • Israeli, E., and R. K. Wood. 2002. “Shortest-Path Network Interdiction.” Networks 40 (2): 97–111. doi:10.1002/(ISSN)1097-0037.
  • Jackson, Matthew O, Social and economic networks. 2008. Social and Economic Networks. Vol. 3. Princeton, NJ: Princeton university press.
  • Kalai, E., and E. Zemel. 1982. “Totally Balanced Games and Games of Flow.” Mathematics of Operations Research 7 (3): 476–478. doi:10.1287/moor.7.3.476.
  • Keohane, N. O., and R. J. Zeckhauser. 2003. The Ecology of Terror Defense. Bostom, MA: Springer.
  • Koutsoupias, E., and C. Papadimitriou. 2009. “Worst-Case Equilibria.” Computer Science Review 3 (2): 65–69. doi:10.1016/j.cosrev.2009.04.003.
  • Kovenock, D., and B. Roberson. 2010. Conflicts with Multiple Battlefields.
  • Kunreuther, H., and G. Heal. 2003. “Interdependent Security.” Journal of Risk and Uncertainty 26 (2–3): 231–249. doi:10.1023/A:1024119208153.
  • Lapan, H. E., and T. Sandler. 1993. “Terrorism and Signalling.” European Journal of Political Economy 9 (3): 383–397. doi:10.1016/0176-2680(93)90006-G.
  • Reijnierse, H., M. Maschler, J. Potters, and S. Tijs. 1996. “Simple Flow Games.” Games and Economic Behavior 16 (2): 238–260. doi:10.1006/game.1996.0085.
  • Sandler, Todd. 2003. “Terrorism & Game Theory.” Simulation & Gaming 34 (3): 319–337. DOI:10.1177/1046878103255492.
  • Sandler, T., and W. Enders. 2004. “An Economic Perspective on Transnational Terrorism.” European Journal of Political Economy 20 (2): 301–316. doi:10.1016/j.ejpoleco.2003.12.007.
  • Smith, J. C. 2010. Basic Interdiction Models. Wiley Encyclopedia of Operations Research and Management Science.
  • Tullock, G. 2001. “Efficient Rent Seeking.” In Pages 3–16 Of: Efficient Rent-Seeking. Springer.
  • Varian, H. 2004. “System Reliability and Free Riding.” In Pages 1–15 Of: Economics of Information Security. Boston, MA: Springer.
  • Washburn, A., and K. Wood. 1995. “Two-Person Zero-Sum Games for Network Interdiction.” Operations Research 43 (2): 243–251. doi:10.1287/opre.43.2.243.
  • Wood, R. K. 1993. “Deterministic Network Interdiction.” Mathematical and Computer Modelling 17 (2): 1–18. doi:10.1016/0895-7177(93)90236-R.
  • Zhu, S., and D. M. Levinson. 2012. “Disruptions to Transportation Networks: A Review.” In Pages 5–20 Of: Network Reliability in Practice. New york, NY: Springer.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.