Strategic Network Interdiction
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Kelly J. Cormican & David P. Morton & R. Kevin Wood, 1998. "Stochastic Network Interdiction," Operations Research, INFORMS, vol. 46(2), pages 184-197, April.
- Coralio Ballester & Antoni Calvó-Armengol & Yves Zenou, 2006.
"Who's Who in Networks. Wanted: The Key Player,"
Econometrica, Econometric Society, vol. 74(5), pages 1403-1417, September.
- Coralio Ballester & Antoni Calvó-Armengol & Yves Zenou, 2004. "Who's Who in Networks. Wanted: The Key Player," Working Papers 178, Barcelona School of Economics.
- Coralio Ballester & Antoni Calvo-Armengol & Yves Zenou, 2005. "Who's Who in Networks. Wanted: the Key Player," NajEcon Working Paper Reviews 666156000000000586, www.najecon.org.
- Zenou, Yves & Calvó-Armengol, Antoni & Ballester, Coralio, 2005. "Who?s Who in Networks. Wanted: The Key Player," CEPR Discussion Papers 5329, C.E.P.R. Discussion Papers.
- Potters, Jos & Reijnierse, Hans & Biswas, Amit, 2006. "The nucleolus of balanced simple flow networks," Games and Economic Behavior, Elsevier, vol. 54(1), pages 205-225, January.
- Aaron Clauset & Maxwell Young & Kristian Skrede Gleditsch, 2007. "On the Frequency of Severe Terrorist Events," Journal of Conflict Resolution, Peace Science Society (International), vol. 51(1), pages 58-87, February.
- Mariagiovanna Baccara & Heski Bar-Isaac, 2008. "How to Organize Crime -super-1," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 75(4), pages 1039-1067.
- Alan Washburn & Kevin Wood, 1995. "Two-Person Zero-Sum Games for Network Interdiction," Operations Research, INFORMS, vol. 43(2), pages 243-251, April.
- Heski Bar-Isaac & Mariagiovanna Baccara, 2008. "Interrogation Methods and Terror Networks," Working Papers 08-8, New York University, Leonard N. Stern School of Business, Department of Economics.
- Heski Bar-Isaac & Mariagiovanna Baccara, 2006. "How to Organize Crime," Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics.
- Ehud Kalai & Eitan Zemel, 1982.
"Generalized Network Problems Yielding Totally Balanced Games,"
Operations Research, INFORMS, vol. 30(5), pages 998-1008, October.
- Ehud Kalai & Eitan Zemel, 1980. "Generalized Network Problems Yielding Totally Balanced Games," Discussion Papers 425, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
- Reijnierse, Hans & Maschler, Michael & Potters, Jos & Tijs, Stef, 1996. "Simple Flow Games," Games and Economic Behavior, Elsevier, vol. 16(2), pages 238-260, October.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Qizhi Fang & Bo Li & Xiaohan Shan & Xiaoming Sun, 2018. "Path cooperative games," Journal of Combinatorial Optimization, Springer, vol. 36(1), pages 211-229, July.
- Acemoglu, Daron & Malekian, Azarakhsh & Ozdaglar, Asu, 2016.
"Network security and contagion,"
Journal of Economic Theory, Elsevier, vol. 166(C), pages 536-585.
- Daron Acemoglu & Azarakhsh Malekian & Asuman Ozdaglar, 2013. "Network Security and Contagion," NBER Working Papers 19174, National Bureau of Economic Research, Inc.
- Daron Acemoglu & Azarakhsh Malekian & Asuman E. Ozdaglar, 2013. "Network Security and Contagion," Levine's Working Paper Archive 786969000000000797, David K. Levine.
- B. Hoyer, 2012. "Network Disruption and the Common Enemy Effect," Working Papers 12-06, Utrecht School of Economics.
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- McBride, Michael & Hewitt, David, 2013.
"The enemy you can’t see: An investigation of the disruption of dark networks,"
Journal of Economic Behavior & Organization, Elsevier, vol. 93(C), pages 32-50.
- Michael McBride & David Hewitt, 2012. "The Enemy You Can't See: An Investigation of the Disruption of Dark Networks," Working Papers 121307, University of California-Irvine, Department of Economics.
- Deng, Liuchun & Sun, Yufeng, 2017. "Criminal network formation and optimal detection policy: The role of cascade of detection," Journal of Economic Behavior & Organization, Elsevier, vol. 141(C), pages 43-63.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Giovanni Mastrobuoni & Eleonora Patacchini, 2010. "Understanding Organized Crime Networks: Evidence Based on Federal Bureau of Narcotics Secret Files on American Mafia," Carlo Alberto Notebooks 152, Collegio Carlo Alberto.
- Goyal, S., 2016. "Networks and Markets," Cambridge Working Papers in Economics 1652, Faculty of Economics, University of Cambridge.
- Antonio Acconcia & Giovanni Immordino & Salvatore Piccolo & Patrick Rey, 2014.
"Accomplice Witnesses and Organized Crime: Theory and Evidence from Italy,"
Scandinavian Journal of Economics, Wiley Blackwell, vol. 116(4), pages 1116-1159, October.
- Acconcia, Antonio & Immordino, Giovanni & Piccolo, Salvatore & Rey, Patrick, 2013. "Accomplice-Witness and Organized Crime: Theory and Evidence from Italy," IDEI Working Papers 777, Institut d'Économie Industrielle (IDEI), Toulouse.
- Rey, Patrick & Immordino, Giovanni & Piccolo, Salvatore & Acconcia, Antonio, 2013. "Accomplice-Witness and Organized Crime: Theory and Evidence from Italy," CEPR Discussion Papers 9543, C.E.P.R. Discussion Papers.
- Acconcia, Antonio & Immordino, Giovanni & Piccolo, Salvatore & Rey, Patrick, 2013. "Accomplice-Witness and Organized Crime: Theory and Evidence from Italy," TSE Working Papers 13-403, Toulouse School of Economics (TSE).
- Emilie Dargaud & Armel Jacques, 2015.
"Endogenous firms’ organization, internal audit and leniency programs,"
Working Papers
1524, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Emilie Dargaud & Armel Jacques, 2017. "Endogenous firms' organization, internal audit and leniency programs," Post-Print halshs-01657082, HAL.
- Emilie Dargaud & Armel Jacques, 2015. "Endogenous firms' organization, internal audit and leniency programs," Working Papers halshs-01199268, HAL.
- Emilie Dargaud & Armel Jacques, 2016. "Endogenous firms' organization, internal audit and leniency programs," Post-Print halshs-01418179, HAL.
- Emilie Dargaud & Armel Jacques, 2016. "Endogenous firms' organization, internal audit and leniency programs," Post-Print halshs-01418174, HAL.
- Emilie Dargaud & Armel Jacques, 2017. "Endogenous firms' organization, internal audit and leniency programs," Post-Print halshs-01657089, HAL.
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
- Salvatore Piccolo & Giovanni Immordino, 2012. "Optimal Accomplice-Witnesses Regulation under Asymmetric Information," CSEF Working Papers 304, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
- Matteo Fischetti & Ivana Ljubić & Michele Monaci & Markus Sinnl, 2019. "Interdiction Games and Monotonicity, with Application to Knapsack Problems," INFORMS Journal on Computing, INFORMS, vol. 31(2), pages 390-410, April.
- Mariagiovanna Baccara, 2007.
"Outsourcing, information leakage, and consulting firms,"
RAND Journal of Economics, RAND Corporation, vol. 38(1), pages 269-289, March.
- Mariagiovanna Baccara, 2008. "Outsourcing, Information Leakage and Consulting Firms," Working Papers 08-7, New York University, Leonard N. Stern School of Business, Department of Economics.
- D’Hernoncourt, Johanna & Méon, Pierre-Guillaume, 2012.
"The not so dark side of trust: Does trust increase the size of the shadow economy?,"
Journal of Economic Behavior & Organization, Elsevier, vol. 81(1), pages 97-121.
- Johanna D'Hernoncourt & Pierre-Guillaume Méon, 2008. "The not so dark side of trust: does trust increase the size of the shadow economy?," Working Papers CEB 08-030, ULB -- Universite Libre de Bruxelles.
- Johanna D'Hernoncourt & Pierre-Guillaume Méon, 2012. "The not so dark side of trust: Does trust increase the size of the shadow economy?," ULB Institutional Repository 2013/98287, ULB -- Universite Libre de Bruxelles.
- Abumoslem Mohammadi & Javad Tayyebi, 2019. "Maximum Capacity Path Interdiction Problem with Fixed Costs," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 36(04), pages 1-21, August.
- Belhaj, Mohamed & Deroïan, Frédéric, 2018.
"Targeting the key player: An incentive-based approach,"
Journal of Mathematical Economics, Elsevier, vol. 79(C), pages 57-64.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the key player: An incentive-based approach," Post-Print hal-01981885, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," Working Papers halshs-01699849, HAL.
- Mohamed Belhaj & Frédéric Deroïan, 2018. "Targeting the Key Player: An Incentive-Based Approach," AMSE Working Papers 1804, Aix-Marseille School of Economics, France.
More about this item
Keywords
Network interdiction; Noncooperative game of flow; Blockage; Nash equilibrium; Kalai- Zemel game of flow;All these keywords.
JEL classification:
- C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
- D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
- H56 - Public Economics - - National Government Expenditures and Related Policies - - - National Security and War
NEP fields
This paper has been announced in the following NEP Reports:- NEP-GTH-2010-11-20 (Game Theory)
- NEP-NET-2010-11-20 (Network Economics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:van:wpaper:1010. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: John P. Conley (email available below). General contact details of provider: http://www.vanderbilt.edu/econ/wparchive/index.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.