Evolutionary dynamics of the interdependent security games on complex network
Author
Abstract
Suggested Citation
DOI: 10.1016/j.amc.2021.126051
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
- Zhu, Xiangbin & Zhao, Jiaying & Hu, Zhaolong, 2019. "Incentive mechanism design for security investment with local exit equilibrium on structured populations," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 531(C).
- Khouzani, MHR. & Liu, Zhengliang & Malacaria, Pasquale, 2019. "Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs," European Journal of Operational Research, Elsevier, vol. 278(3), pages 894-903.
- Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
- Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
- Wang, Zhigang & Zhang, Haifeng & Wang, Zhen, 2014. "Multiple effects of self-protection on the spreading of epidemics," Chaos, Solitons & Fractals, Elsevier, vol. 61(C), pages 1-7.
- Ding, Hong & Xu, Jia-Hao & Wang, Zhen & Ren, Yi-Zhi & Cui, Guang-Hai, 2018. "Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 503(C), pages 390-399.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Jin, Xing & Tao, Yuchen & Wang, Jingrui & Wang, Chao & Wang, Yongheng & Zhang, Zhouyang & Wang, Zhen, 2023. "Strategic use of payoff information in k-hop evolutionary Best-shot networked public goods game," Applied Mathematics and Computation, Elsevier, vol. 459(C).
- Lou, Fangzheng & Li, Feng & Wang, Jing & Wang, Yan, 2022. "Reliable output feedback control for persistent dwell-time switched piecewise-affine systems against deception attacks," Applied Mathematics and Computation, Elsevier, vol. 426(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Corbet, Shaen & Gurdgiev, Constantin, 2019. "What the hack: Systematic risk contagion from cyber events," International Review of Financial Analysis, Elsevier, vol. 65(C).
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Kaur, Harpreet & Gupta, Mahima & Singh, Surya Prakash, 2024. "Integrated model to optimize supplier selection and investments for cyber resilience in digital supply chains," International Journal of Production Economics, Elsevier, vol. 275(C).
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Zhang, Yaming & Su, Yanyuan & Weigang, Li & Liu, Haiou, 2019. "Interacting model of rumor propagation and behavior spreading in multiplex networks," Chaos, Solitons & Fractals, Elsevier, vol. 121(C), pages 168-177.
- Michel Benaroch, 2018. "Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making," Information Systems Research, INFORMS, vol. 29(2), pages 315-340, June.
- Juang, Jonq & Liang, Yu-Hao, 2024. "Epidemic models in well-mixed multiplex networks with distributed time delay," Applied Mathematics and Computation, Elsevier, vol. 474(C).
- Cui, Guang-Hai & Li, Jun-Li & Dong, Kun-Xiang & Jin, Xing & Yang, Hong-Yong & Wang, Zhen, 2024. "Influence of subsidy policies against insurances on controlling the propagation of epidemic security risks in networks," Applied Mathematics and Computation, Elsevier, vol. 476(C).
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
- J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Voluntary participation in a terror group and counterterrorism policy,"
Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
- David Rios Insua & Aitor Couce‐Vieira & Jose A. Rubio & Wolter Pieters & Katsiaryna Labunets & Daniel G. Rasines, 2021. "An Adversarial Risk Analysis Framework for Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 41(1), pages 16-36, January.
- Li, Li, 2015. "Bifurcation and chaos in a discrete physiological control system," Applied Mathematics and Computation, Elsevier, vol. 252(C), pages 397-404.
- Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
- Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
- Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Soriano-Sánchez, A.G. & Posadas-Castillo, C., 2018. "Smart pattern to generate small–world networks," Chaos, Solitons & Fractals, Elsevier, vol. 114(C), pages 415-422.
- Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
More about this item
Keywords
Interdependent security games; Evolutionary game; Complex network;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:apmaco:v:399:y:2021:i:c:s0096300321000990. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/applied-mathematics-and-computation .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.