Evolutionary dynamics of the interdependent security games on complex network
Author
Abstract
Suggested Citation
DOI: 10.1016/j.amc.2021.126051
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Schilling, Andreas & Werners, Brigitte, 2016. "Optimal selection of IT security safeguards from an existing knowledge base," European Journal of Operational Research, Elsevier, vol. 248(1), pages 318-327.
- Zhu, Xiangbin & Zhao, Jiaying & Hu, Zhaolong, 2019. "Incentive mechanism design for security investment with local exit equilibrium on structured populations," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 531(C).
- Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
- Khouzani, MHR. & Liu, Zhengliang & Malacaria, Pasquale, 2019. "Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs," European Journal of Operational Research, Elsevier, vol. 278(3), pages 894-903.
- Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
- Wang, Zhigang & Zhang, Haifeng & Wang, Zhen, 2014. "Multiple effects of self-protection on the spreading of epidemics," Chaos, Solitons & Fractals, Elsevier, vol. 61(C), pages 1-7.
- Ding, Hong & Xu, Jia-Hao & Wang, Zhen & Ren, Yi-Zhi & Cui, Guang-Hai, 2018. "Subsidy strategy based on history information can stimulate voluntary vaccination behaviors on seasonal diseases," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 503(C), pages 390-399.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Jin, Xing & Tao, Yuchen & Wang, Jingrui & Wang, Chao & Wang, Yongheng & Zhang, Zhouyang & Wang, Zhen, 2023. "Strategic use of payoff information in k-hop evolutionary Best-shot networked public goods game," Applied Mathematics and Computation, Elsevier, vol. 459(C).
- Lou, Fangzheng & Li, Feng & Wang, Jing & Wang, Yan, 2022. "Reliable output feedback control for persistent dwell-time switched piecewise-affine systems against deception attacks," Applied Mathematics and Computation, Elsevier, vol. 426(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Corbet, Shaen & Gurdgiev, Constantin, 2019. "What the hack: Systematic risk contagion from cyber events," International Review of Financial Analysis, Elsevier, vol. 65(C).
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Fan, Lurong & Xu, Jiuping, 2020. "Authority–enterprise equilibrium based mixed subsidy mechanism for carbon reduction and energy utilization in the coalbed methane industry," Energy Policy, Elsevier, vol. 147(C).
- Ziyi Chen & Kaiyan Dai & Xing Jin & Liqin Hu & Yongheng Wang, 2023. "Aspiration-Based Learning in k -Hop Best-Shot Binary Networked Public Goods Games," Mathematics, MDPI, vol. 11(14), pages 1-19, July.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
- Zhang, Yaming & Su, Yanyuan & Weigang, Li & Liu, Haiou, 2019. "Interacting model of rumor propagation and behavior spreading in multiplex networks," Chaos, Solitons & Fractals, Elsevier, vol. 121(C), pages 168-177.
- Michel Benaroch, 2018. "Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making," Information Systems Research, INFORMS, vol. 29(2), pages 315-340, June.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Politically influenced counterterrorism policy and welfare efficiency,"
European Journal of Political Economy, Elsevier, vol. 76(C).
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Politically influenced counterterrorism policy and welfare efficiency," Working Papers 2022-007, Federal Reserve Bank of St. Louis.
- Barbati, M. & Figueira, J.R. & Greco, S. & Ishizaka, A. & Panaro, S., 2023. "A multiple criteria methodology for priority based portfolio selection," Socio-Economic Planning Sciences, Elsevier, vol. 88(C).
- Juang, Jonq & Liang, Yu-Hao, 2024. "Epidemic models in well-mixed multiplex networks with distributed time delay," Applied Mathematics and Computation, Elsevier, vol. 474(C).
- Paul, Jomon A. & Zhang, Minjiao, 2021. "Decision support model for cybersecurity risk planning: A two-stage stochastic programming framework featuring firms, government, and attacker," European Journal of Operational Research, Elsevier, vol. 291(1), pages 349-364.
- Quantong Guo & Yanjun Lei & Chengyi Xia & Lu Guo & Xin Jiang & Zhiming Zheng, 2016. "The Role of Node Heterogeneity in the Coupled Spreading of Epidemics and Awareness," PLOS ONE, Public Library of Science, vol. 11(8), pages 1-19, August.
- Marco Pelliccia, 2020.
"Decentralized Defence of a (Directed) Network Structure,"
Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
- Marco Pelliccia, 2015. "Decentralised Defence of a (Directed) Network Structure," Birkbeck Working Papers in Economics and Finance 1506, Birkbeck, Department of Economics, Mathematics & Statistics.
- Huang, Jiechen & Wang, Juan & Xia, Chengyi, 2020. "Role of vaccine efficacy in the vaccination behavior under myopic update rule on complex networks," Chaos, Solitons & Fractals, Elsevier, vol. 130(C).
- Andrew M. Smith & Andrés D. González & Leonardo Dueñas‐Osorio & Raissa M. D'Souza, 2020. "Interdependent Network Recovery Games," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 134-152, January.
- Bandyopadhyay, Subhayu & Sandler, Todd, 2023.
"Voluntary participation in a terror group and counterterrorism policy,"
Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
- Subhayu Bandyopadhyay & Todd Sandler, 2022. "Voluntary participation in a terror group and counterterrorism policy," Working Papers 2022-023, Federal Reserve Bank of St. Louis.
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- Kay-Yut Chen & Jingguo Wang & Yan Lang, 2022. "Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals," Management Science, INFORMS, vol. 68(7), pages 5269-5286, July.
- Crowther, Kenneth G., 2008. "Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model," International Journal of Critical Infrastructure Protection, Elsevier, vol. 1(C), pages 53-67.
- Hare, Forrest & Goldstein, Jonathan, 2010. "The interdependent security problem in the defense industrial base: An agent-based model on a social network," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(3), pages 128-139.
More about this item
Keywords
Interdependent security games; Evolutionary game; Complex network;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:apmaco:v:399:y:2021:i:c:s0096300321000990. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/applied-mathematics-and-computation .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.