Decentralised Defence of a (Directed) Network Structure
Author
Abstract
Suggested Citation
Download full text from publisher
Other versions of this item:
- Marco Pelliccia, 2020. "Decentralized Defence of a (Directed) Network Structure," Defence and Peace Economics, Taylor & Francis Journals, vol. 31(6), pages 659-676, August.
References listed on IDEAS
- Sanjeev Goyal & Adrien Vigier, 2014.
"Attack, Defence, and Contagion in Networks,"
Review of Economic Studies,
Oxford University Press, vol. 81(4), pages 1518-1542.
- S. Goyal & A. Vigier, 2013. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1327, Faculty of Economics, University of Cambridge.
- Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defense and Contagion in Networks," Cambridge Working Papers in Economics 1451, Faculty of Economics, University of Cambridge.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Cerdeiro, Diego & Dziubinski, Marcin & Goyal, Sanjeev, 2015.
"Contagion Risk and Network Design,"
Climate Change and Sustainable Development
206416, Fondazione Eni Enrico Mattei (FEEM).
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Working Papers 2015.56, Fondazione Eni Enrico Mattei.
- Diego Cerdeiro & Marcin Dziubinski & Sanjeev Goyal, 2015. "Contagion Risk and Network Design," Cambridge Working Papers in Economics 1547, Faculty of Economics, University of Cambridge.
- Keohane, Nathaniel O & Zeckhauser, Richard J, 2003. "The Ecology of Terror Defense," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 201-229, March-May.
- Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
- Lapan, Harvey E. & Sandler, Todd, 1993.
"Terrorism and signalling,"
European Journal of Political Economy, Elsevier, vol. 9(3), pages 383-397, August.
- Lapan, Harvey E. & Sandler, Todd, 1993. "Terrorism and Signalling," Staff General Research Papers Archive 10808, Iowa State University, Department of Economics.
- repec:oup:restud:v:81:y:2014:i:4:p:1518-1542. is not listed on IDEAS
- Geoffrey Heal & Howard Kunreuther, 2004. "Interdependent Security: A General Model," NBER Working Papers 10706, National Bureau of Economic Research, Inc.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Dziubiński, Marcin & Goyal, Sanjeev, 2013. "Network design and defence," Games and Economic Behavior, Elsevier, vol. 79(C), pages 30-43.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017.
"Network Formation and Disruption - An Experiment - Are Efficient Networks too Complex?,"
ETA: Economic Theory and Applications
258012, Fondazione Eni Enrico Mattei (FEEM).
- Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment. Are efficient networks too complex?," Working Papers CIE 101, Paderborn University, CIE Center for International Economics.
- Sonja Brangewitz & Behnud Mir Djawadi & Angelika Endres & Britta Hoyer, 2017. "Network Formation and Disruption - An Experiment - Are Efficient Networks too Complex?," Working Papers 2017.30, Fondazione Eni Enrico Mattei.
- Djawadi, Behnud Mir & Endres, Angelika & Hoyer, Britta & Recker, Sonja, 2019. "Network formation and disruption - An experiment are equilibrium networks too complex?," Journal of Economic Behavior & Organization, Elsevier, vol. 157(C), pages 708-734.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007.
"Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,"
Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
- Vicki Bier & Santiago Oliveros & Larry Samuelson, 2006. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Levine's Bibliography 321307000000000158, UCLA Department of Economics.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Marcin Dziubinski & Sanjeev Goyal, 2014. "How to Defend a Network?," Cambridge Working Papers in Economics 1450, Faculty of Economics, University of Cambridge.
- Geoffrey Heal & Howard Kunreuther, 2005. "IDS Models of Airline Security," Journal of Conflict Resolution, Peace Science Society (International), vol. 49(2), pages 201-217, April.
- Marcin Dziubinski & Sanjeev Goyal & Adrien Vigier, 2015. "Conflict and Networks," Cambridge Working Papers in Economics 1565, Faculty of Economics, University of Cambridge.
- Dziubiński, Marcin Konrad & Goyal, Sanjeev, 2017. "How do you defend a network?," Theoretical Economics, Econometric Society, vol. 12(1), January.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Bravard, Christophe & Charroin, Liza & Touati, Corinne, 2017.
"Optimal design and defense of networks under link attacks,"
Journal of Mathematical Economics, Elsevier, vol. 68(C), pages 62-79.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers 1519, Groupe d'Analyse et de Théorie Economique Lyon St-Étienne (GATE Lyon St-Étienne), Université de Lyon.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2017. "Optimal Design and Defense of Networks Under Link Attacks," Post-Print hal-01384998, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2016. "Optimal design and defense of networks under link attacks," Post-Print halshs-01411520, HAL.
- Christophe Bravard & Liza Charroin & Corinne Touati, 2015. "Optimal design and defense of networks under link attacks," Working Papers halshs-01176928, HAL.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019.
"The attack and defense of weakest-link networks,"
Public Choice, Springer, vol. 179(3), pages 175-194, June.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Working Papers 10-14, Chapman University, Economic Science Institute.
- Kovenock, Dan & Roberson, Brian & Sheremeta, Roman, 2018. "The attack and defense of weakest-link networks," MPRA Paper 89292, University Library of Munich, Germany.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2017. "The Attack and Defense of Weakest-Link Networks," Working Papers 17-19, Chapman University, Economic Science Institute.
- Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," Purdue University Economics Working Papers 1256, Purdue University, Department of Economics.
- Dan Kovenock J. & Brian Roberson & Roman M. Sheremeta, 2010. "The Attack and Defense of Weakest-Link Networks," CESifo Working Paper Series 3211, CESifo.
- Dan Kovenock & Brian Roberson, 2018.
"The Optimal Defense Of Networks Of Targets,"
Economic Inquiry, Western Economic Association International, vol. 56(4), pages 2195-2211, October.
- Dan Kovenock & Brian Roberson, 2010. "The Optimal Defense of Networks of Targets," Purdue University Economics Working Papers 1251, Purdue University, Department of Economics.
- Dan Kovenock & Brian Roberson, 2017. "The Optimal Defense of Networks of Targets," Working Papers 17-18, Chapman University, Economic Science Institute.
- Subhayu Bandyopadhyay & Todd Sandler, 2011.
"The Interplay Between Preemptive and Defensive Counterterrorism Measures: A Two‐stage Game,"
Economica, London School of Economics and Political Science, vol. 78(311), pages 546-564, July.
- Subhayu Bandyopadhyay & Todd Sandler, 2009. "The interplay between preemptive and defensive counterterrorism measures: a two-stage game," Working Papers 2008-034, Federal Reserve Bank of St. Louis.
- Abhra Roy & Jomon Paul, 2013. "Terrorism deterrence in a two country framework: strategic interactions between R&D, defense and pre-emption," Annals of Operations Research, Springer, vol. 211(1), pages 399-432, December.
- Bernhardt, Dan & Polborn, Mattias K., 2010. "Non-convexities and the gains from concealing defenses from committed terrorists," Economics Letters, Elsevier, vol. 107(1), pages 52-54, April.
- Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
- Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
- Mario Gilli & Paolo Tedeschi, 2020. "European Union and Transnational Terrorism. A Normative Analysis of Strategic Spillovers," Working Papers 437, University of Milano-Bicocca, Department of Economics, revised Mar 2020.
- Howard Kunreuther & Erwann Michel-Kerjan & Beverly Porter, 2003. "Assessing, Managing, and Financing Extreme Events: Dealing with Terrorism," NBER Working Papers 10179, National Bureau of Economic Research, Inc.
- Landwehr, Jakob, 2015. "Network design and imperfect defense," Center for Mathematical Economics Working Papers 537, Center for Mathematical Economics, Bielefeld University.
- Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
- Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
More about this item
Keywords
Networks; Network defence; Security.;All these keywords.
JEL classification:
- C69 - Mathematical and Quantitative Methods - - Mathematical Methods; Programming Models; Mathematical and Simulation Modeling - - - Other
NEP fields
This paper has been announced in the following NEP Reports:- NEP-GTH-2015-07-11 (Game Theory)
- NEP-NET-2015-07-11 (Network Economics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bbk:bbkefp:1506. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: the person in charge (email available below). General contact details of provider: https://www.bbk.ac.uk/departments/ems/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.