Securing Infrastructure Facilities: When Does Proactive Defense Help?
Author
Abstract
Suggested Citation
DOI: 10.1007/s13235-018-0280-8
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Bagwell, Kyle, 1995.
"Commitment and observability in games,"
Games and Economic Behavior, Elsevier, vol. 8(2), pages 271-280.
- Kyle Bagwell, 1992. "Commitment and Observability in Games," Discussion Papers 1014, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Fudenberg, Drew & Levine, David K., 1995.
"Consistency and cautious fictitious play,"
Journal of Economic Dynamics and Control, Elsevier, vol. 19(5-7), pages 1065-1089.
- Fudenberg, Drew & Levine, David, 1995. "Consistency and Cautious Fictitious Play," Scholarly Articles 3198694, Harvard University Department of Economics.
- Drew Fudenberg & David K. Levine, 1996. "Consistency and Cautious Fictitious Play," Levine's Working Paper Archive 470, David K. Levine.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Kalai, Ehud & Lehrer, Ehud, 1993.
"Rational Learning Leads to Nash Equilibrium,"
Econometrica, Econometric Society, vol. 61(5), pages 1019-1045, September.
- Ehud Kalai & Ehud Lehrer, 1990. "Rational Learning Leads to Nash Equilibrium," Discussion Papers 895, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Kalai, Ehud & Lehrer, Ehud, 1991. "Rational Learning Leads to Nash Equilibrium," Working Papers 91-18, C.V. Starr Center for Applied Economics, New York University.
- E. Kalai & E. Lehrer, 2010. "Rational Learning Leads to Nash Equilibrium," Levine's Working Paper Archive 529, David K. Levine.
- Ehud Kalai & Ehud Lehrer, 1990. "Rational Learning Leads to Nash Equilibrium," Discussion Papers 925, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Maskin, Eric & Tirole, Jean, 2001.
"Markov Perfect Equilibrium: I. Observable Actions,"
Journal of Economic Theory, Elsevier, vol. 100(2), pages 191-219, October.
- Eric Maskin & Jean Tirole, 1997. "Markov Perfect Equilibrium, I: Observable Actions," Harvard Institute of Economic Research Working Papers 1799, Harvard - Institute of Economic Research.
- Alan Washburn & Kevin Wood, 1995. "Two-Person Zero-Sum Games for Network Interdiction," Operations Research, INFORMS, vol. 43(2), pages 243-251, April.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Beggs, A.W., 2005.
"On the convergence of reinforcement learning,"
Journal of Economic Theory, Elsevier, vol. 122(1), pages 1-36, May.
- Alan Beggs, 2002. "On the Convergence of Reinforcement Learning," Economics Series Working Papers 96, University of Oxford, Department of Economics.
- Fudenberg, Drew & Kreps, David M., 1995. "Learning in extensive-form games I. Self-confirming equilibria," Games and Economic Behavior, Elsevier, vol. 8(1), pages 20-55.
- Kalai, Ehud & Lehrer, Ehud, 1993.
"Subjective Equilibrium in Repeated Games,"
Econometrica, Econometric Society, vol. 61(5), pages 1231-1240, September.
- Ehud Kalai & Ehud Lehrer, 1991. "Subjective Equilibrium in Repeated Games," Discussion Papers 981, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
- Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
- Powell, Robert, 2007. "Defending against Terrorist Attacks with Limited Resources," American Political Science Review, Cambridge University Press, vol. 101(3), pages 527-541, August.
- Cominetti, Roberto & Melo, Emerson & Sorin, Sylvain, 2010. "A payoff-based learning procedure and its application to traffic games," Games and Economic Behavior, Elsevier, vol. 70(1), pages 71-83, September.
- Josef Hofbauer & William H. Sandholm, 2002. "On the Global Convergence of Stochastic Fictitious Play," Econometrica, Econometric Society, vol. 70(6), pages 2265-2294, November.
- Sandholm, William H., 2001.
"Potential Games with Continuous Player Sets,"
Journal of Economic Theory, Elsevier, vol. 97(1), pages 81-108, March.
- Sandholm,W.H., 1999. "Potential games with continuous player sets," Working papers 23, Wisconsin Madison - Social Systems.
- repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
- Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
- Laporte, Gilbert & Mesa, Juan A. & Perea, Federico, 2010. "A game theoretic framework for the robust railway transit network design problem," Transportation Research Part B: Methodological, Elsevier, vol. 44(4), pages 447-459, May.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Manxi Wu & Saurabh Amin & Asuman Ozdaglar, 2021. "Multi-agent Bayesian Learning with Best Response Dynamics: Convergence and Stability," Papers 2109.00719, arXiv.org.
- Sobel, Joel, 2000. "Economists' Models of Learning," Journal of Economic Theory, Elsevier, vol. 94(2), pages 241-261, October.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2023.
"Attack and interception in networks,"
Theoretical Economics, Econometric Society, vol. 18(4), November.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," CRETA Online Discussion Paper Series 68, Centre for Research in Economic Theory and its Applications CRETA.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," The Warwick Economics Research Paper Series (TWERPS) 1338, University of Warwick, Department of Economics.
- Francis Bloch & Kalyan Chatterjee & Bhaskar Dutta, 2021. "Attack and Interception in Networks," Working Papers 57, Ashoka University, Department of Economics.
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Schipper, Burkhard C., 2021.
"Discovery and equilibrium in games with unawareness,"
Journal of Economic Theory, Elsevier, vol. 198(C).
- Schipper, Burkhard C, 2018. "Discovery and Equilibrium in Games with Unawareness," MPRA Paper 86300, University Library of Munich, Germany.
- Burkhard C. Schipper, 2021. "Discovery and Equilibrium in Games with Unawareness," Working Papers 340, University of California, Davis, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Yoo, Seung Han, 2014.
"Learning a population distribution,"
Journal of Economic Dynamics and Control, Elsevier, vol. 48(C), pages 188-201.
- Seung Han Yoo, 2014. "Learning a Population Distribution," Discussion Paper Series 1401, Institute of Economic Research, Korea University.
- Mario Gilli, 2002. "Rational Learning in Imperfect Monitoring Games," Working Papers 46, University of Milano-Bicocca, Department of Economics, revised Mar 2002.
- Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
- Funai, Naoki, 2022. "Reinforcement learning with foregone payoff information in normal form games," Journal of Economic Behavior & Organization, Elsevier, vol. 200(C), pages 638-660.
- Drew Fudenberg & David K Levine, 2005. "Learning and Belief Based Trading," Levine's Working Paper Archive 618897000000000975, David K. Levine.
- Belhaj, Mohamed & Deroïan, Frédéric, 2018.
"Targeting the key player: An incentive-based approach,"
Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," AMSE Working Papers 1804, Aix-Marseille School of Economics, France.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," Working Papers halshs-01699849, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the key player: An incentive-based approach," Post-Print hal-01981885, HAL.
- Naoki Funai, 2019. "Convergence results on stochastic adaptive learning," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 68(4), pages 907-934, November.
- Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.
More about this item
Keywords
Infrastructure security; Normal form game; Sequential game;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:dyngam:v:9:y:2019:i:4:d:10.1007_s13235-018-0280-8. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.