Attack, Defence, and Contagion in Networks
From MaRDI portal
Publication:4610693
DOI10.1093/restud/rdu013zbMath1405.91074OpenAlexW2013228821MaRDI QIDQ4610693
Publication date: 23 January 2019
Published in: The Review of Economic Studies (Search for Journal in Brave)
Full work available at URL: https://nottingham-repository.worktribe.com/output/4920408
Epidemiology (92D30) 2-person games (91A05) Games involving graphs (91A43) Deterministic network models in operations research (90B10) Authentication, digital signatures and secret sharing (94A62)
Related Items (16)
Individual security, contagion, and network design ⋮ Network security and contagion ⋮ Network Inspection for Detecting Strategic Attacks ⋮ Network connectivity under node failure ⋮ Equilibrium characterization and shock propagation in conflict networks ⋮ The network origins of the gains from trade ⋮ Effort discrimination and curvature of contest technology in conflict networks ⋮ Attack and interception in networks ⋮ Network disruption and the common-enemy effect ⋮ Determinants of equilibrium selection in network formation: an experiment ⋮ A game of hide and seek in networks ⋮ A note on connectivity and stability in dynamic network formation ⋮ Optimal design and defense of networks under link attacks ⋮ A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game ⋮ Securing infrastructure facilities: when does proactive defense help? ⋮ How Do You Defend a Network?
This page was built for publication: Attack, Defence, and Contagion in Networks