Attack and interception in networks
Author
Abstract
Suggested Citation
Download full text from publisher
Other versions of this item:
- Francis Bloch & Kalyan Chatterjee & Bhaskar Dutta, 2021. "Attack and Interception in Networks," Working Papers 57, Ashoka University, Department of Economics.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," CRETA Online Discussion Paper Series 68, Centre for Research in Economic Theory and its Applications CRETA.
- Bloch, Francis & Chatterjee, Kalyan & Dutta, Bhaskar, 2021. "Attack and Interception in Networks," The Warwick Economics Research Paper Series (TWERPS) 1338, University of Warwick, Department of Economics.
References listed on IDEAS
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Kelly J. Cormican & David P. Morton & R. Kevin Wood, 1998. "Stochastic Network Interdiction," Operations Research, INFORMS, vol. 46(2), pages 184-197, April.
- Christian Dustmann & Francesco Fasani & Tommaso Frattini & Luigi Minale & Uta Schönberg, 2017.
"On the economics and politics of refugee migration,"
Economic Policy, CEPR, CESifo, Sciences Po;CES;MSH, vol. 32(91), pages 497-550.
- Christian Dustmann & Francesco Fasani & Tommaso Frattini & Luigi Minale & Uta Schӧnberg, 2016. "On the Economics and Politics of Refugee Migration," Development Working Papers 403, Centro Studi Luca d'Agliano, University of Milano, revised 28 Sep 2016.
- Christian Dustman & Francesco Fasani Fasani & Tommaso Frattini & Luigi Minale & Uta Schӧnberg, 2016. "The Economics and Politics of Refugee Migration," RF Berlin - CReAM Discussion Paper Series 1616, Rockwool Foundation Berlin (RF Berlin) - Centre for Research and Analysis of Migration (CReAM).
- Fasani, Francesco & Dustmann, Christian & Schonberg, Uta & Frattini, Tommaso & Minale, Luigi, 2016. "On the Economics and Politics of Refugee Migration," CEPR Discussion Papers 11557, C.E.P.R. Discussion Papers.
- Dustmann, Christian & Fasani, Francesco & Frattini, Tommaso & Minale, Luigi & Schönberg, Uta, 2016. "On the Economics and Politics of Refugee Migration," IZA Discussion Papers 10234, Institute of Labor Economics (IZA).
- Christian Dustmann & Francesco Fasani & Tommaso Frattini & Luigi Minale & Uta Schönberg, 2016. "On the Economics and Politics of Refugee Migration," CESifo Working Paper Series 6111, CESifo.
- Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
- Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
The Review of Economic Studies, Review of Economic Studies Ltd, vol. 81(4), pages 1518-1542.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- P. M. Ghare & D. C. Montgomery & W. C. Turner, 1971. "Optimal interdiction policy for a flow network," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 18(1), pages 37-45, March.
- Richard Wollmer, 1964. "Removing Arcs from a Network," Operations Research, INFORMS, vol. 12(6), pages 934-940, December.
- Bruce Golden, 1978. "A problem in network interdiction," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 25(4), pages 711-713, December.
- Alan Washburn & Kevin Wood, 1995. "Two-Person Zero-Sum Games for Network Interdiction," Operations Research, INFORMS, vol. 43(2), pages 243-251, April.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Melissa Dell, 2015. "Trafficking Networks and the Mexican Drug War," American Economic Review, American Economic Association, vol. 105(6), pages 1738-1779, June.
- repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
- Alan W. McMasters & Thomas M. Mustin, 1970. "Optimal interdiction of a supply network," Naval Research Logistics Quarterly, John Wiley & Sons, vol. 17(3), pages 261-268, September.
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
- Cerdeiro, Diego A. & Dziubiński, Marcin & Goyal, Sanjeev, 2017. "Individual security, contagion, and network design," Journal of Economic Theory, Elsevier, vol. 170(C), pages 182-226.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Chang, Jin-Wook & Jayachandran, Kartik & Ramírez, Carlos A. & Tintera, Ali, 2024. "On the anatomy of cyberattacks," Economics Letters, Elsevier, vol. 238(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
- Claudio Contardo & Jorge A. Sefair, 2022. "A Progressive Approximation Approach for the Exact Solution of Sparse Large-Scale Binary Interdiction Games," INFORMS Journal on Computing, INFORMS, vol. 34(2), pages 890-908, March.
- Abumoslem Mohammadi & Javad Tayyebi, 2019. "Maximum Capacity Path Interdiction Problem with Fixed Costs," Asia-Pacific Journal of Operational Research (APJOR), World Scientific Publishing Co. Pte. Ltd., vol. 36(04), pages 1-21, August.
- Alessandro Fedele & Cristian Roner, 2022.
"Dangerous games: A literature review on cybersecurity investments,"
Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
- Alessandro Fedele & Cristian Roner, 2020. "Dangerous Games: A Literature Review on Cybersecurity Investments," BEMPS - Bozen Economics & Management Paper Series BEMPS75, Faculty of Economics and Management at the Free University of Bozen.
- Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
- Tayyebi, Javad & Mitra, Ankan & Sefair, Jorge A., 2023. "The continuous maximum capacity path interdiction problem," European Journal of Operational Research, Elsevier, vol. 305(1), pages 38-52.
- Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022.
"Network defense and behavioral biases: an experimental study,"
Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
- Timothy N. Cason & Daniel Woods & Mustafa Abdallah & Saurabh Bagechi & Shreyas Sundaram, 2021. "Network Defense and Behavior Biases: An Experimental Study," Purdue University Economics Working Papers 1328, Purdue University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubiński, Marcin, 2020.
"A game of hide and seek in networks,"
Journal of Economic Theory, Elsevier, vol. 190(C).
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," CRETA Online Discussion Paper Series 53, Centre for Research in Economic Theory and its Applications CRETA.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubinski, 2020. "A game of hide and seek in networks," Papers 2001.03132, arXiv.org.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," Post-Print halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubiński, 2020. "A game of hide and seek in networks," PSE-Ecole d'économie de Paris (Postprint) halshs-03230063, HAL.
- Francis Bloch & Bhaskar Dutta & Marcin Dziubi´nski, 2019. "A Game of Hide and Seek in Networks," Working Papers 21, Ashoka University, Department of Economics.
- Bloch, Francis & Dutta, Bhaskar & Dziubinski, Marcin, 2019. "A Game of Hide and Seek in Networks," The Warwick Economics Research Paper Series (TWERPS) 1226, University of Warwick, Department of Economics.
- Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.
- Chaya Losada & M. Scaparra & Richard Church & Mark Daskin, 2012. "The stochastic interdiction median problem with disruption intensity levels," Annals of Operations Research, Springer, vol. 201(1), pages 345-365, December.
- Kübra Tanınmış & Markus Sinnl, 2022. "A Branch-and-Cut Algorithm for Submodular Interdiction Games," INFORMS Journal on Computing, INFORMS, vol. 34(5), pages 2634-2657, September.
- Noam Goldberg, 2017. "Non‐zero‐sum nonlinear network path interdiction with an application to inspection in terror networks," Naval Research Logistics (NRL), John Wiley & Sons, vol. 64(2), pages 139-153, March.
- Young‐Soo Myung & Hyun‐Joon Kim, 2007. "Network disconnection problems in a centralized network," Naval Research Logistics (NRL), John Wiley & Sons, vol. 54(7), pages 710-719, October.
- Shen, Yeming & Sharkey, Thomas C. & Szymanski, Boleslaw K. & Wallace, William (Al), 2021. "Interdicting interdependent contraband smuggling, money and money laundering networks," Socio-Economic Planning Sciences, Elsevier, vol. 78(C).
- Jabarzare, Ziba & Zolfagharinia, Hossein & Najafi, Mehdi, 2020. "Dynamic interdiction networks with applications in illicit supply chains," Omega, Elsevier, vol. 96(C).
- Manxi Wu & Saurabh Amin, 2019. "Securing Infrastructure Facilities: When Does Proactive Defense Help?," Dynamic Games and Applications, Springer, vol. 9(4), pages 984-1025, December.
- Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
- Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
- Nguyen, Di H. & Smith, J. Cole, 2022. "Network interdiction with asymmetric cost uncertainty," European Journal of Operational Research, Elsevier, vol. 297(1), pages 239-251.
More about this item
Keywords
Keywords: Network interdiction; networks; attack and defense; inspection games;All these keywords.
JEL classification:
- D85 - Microeconomics - - Information, Knowledge, and Uncertainty - - - Network Formation
- C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:the:publsh:5122. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Martin J. Osborne (email available below). General contact details of provider: http://econtheory.org .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.