Interdependent defense games with applications to internet security at the level of autonomous systems
DOI10.3390/g8010013zbMath1407.91064OpenAlexW2587876756WikidataQ60106436 ScholiaQ60106436MaRDI QIDQ725097
Hau Chan, Michael Ceyko, Luis E. Ortiz
Publication date: 1 August 2018
Published in: Games (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/g8010013
learning in gamesequilibrium computationcomputational game theoryinterdependent securityfully polynomial-time approximation schemeautonomous-systems internet security applicationequilibrium characterization
Applications of graph theory (05C90) Games involving graphs (91A43) Dynamic programming (90C39) Rationality and learning in game theory (91A26) Internet topics (68M11)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A strategic analysis of the war against transnational terrorism
- New complexity results about Nash equilibria
- Game theoretic risk analysis of security threats
- Nash and correlated equilibria: Some complexity considerations
- Subjectivity and correlation in randomized strategies
- On the complexity of the parity argument and other inefficient proofs of existence
- Interdependent security
- Graphical models for optimal power flow
- Quantal response equilibria for normal form games
- On influence, stable behavior, and the most influential individuals in networks: a game-theoretic approach
- Non-cooperative games
- Uncertainty in Interdependent Security Games
- Information Theory and Statistical Mechanics
- Settling the complexity of computing two-player Nash equilibria
- Correlated Equilibrium as an Expression of Bayesian Rationality
- A random polynomial-time algorithm for approximating the volume of convex bodies
- The Complexity of Computing a Nash Equilibrium
- Elements of Information Theory
This page was built for publication: Interdependent defense games with applications to internet security at the level of autonomous systems