메뉴 건너뛰기




Volumn 203, Issue 2, 2010, Pages 409-418

Modeling secrecy and deception in a multiple-period attacker-defender signaling game

Author keywords

Dynamic programming; Game theory; Multi period game; Secrecy and deception; Signaling game; Truthful disclosure

Indexed keywords

INCOMPLETE INFORMATION; INFORMATION UPDATING; MULTI-PERIOD GAME; PRIVATE INFORMATION; SECRECY AND DECEPTION; SIGNALING GAME; SOLUTION APPROACH; TIME PERIODS; TRUTHFUL DISCLOSURE;

EID: 70350704685     PISSN: 03772217     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ejor.2009.07.028     Document Type: Article
Times cited : (201)

References (25)
  • 2
    • 27344439516 scopus 로고    scopus 로고
    • A two-sided optimization for theater ballistic missile defense
    • Brown G., Carlyle M., Diehl D., Kline J., and Wood K. A two-sided optimization for theater ballistic missile defense. Operations Research 53 5 (2005) 263-275
    • (2005) Operations Research , vol.53 , Issue.5 , pp. 263-275
    • Brown, G.1    Carlyle, M.2    Diehl, D.3    Kline, J.4    Wood, K.5
  • 4
    • 0008339940 scopus 로고    scopus 로고
    • Dynamic games with hidden actions and hidden states
    • Coleb H.L., and Kocherlakotad N. Dynamic games with hidden actions and hidden states. Journal of Economic Theory 98 1 (2001) 114-126
    • (2001) Journal of Economic Theory , vol.98 , Issue.1 , pp. 114-126
    • Coleb, H.L.1    Kocherlakotad, N.2
  • 5
    • 0242433408 scopus 로고    scopus 로고
    • Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions
    • Crawford V.P. Lying for strategic advantage: Rational and boundedly rational misrepresentation of intentions. American Economic Review 93 1 (2003) 133-149
    • (2003) American Economic Review , vol.93 , Issue.1 , pp. 133-149
    • Crawford, V.P.1
  • 6
    • 30444461505 scopus 로고    scopus 로고
    • Dynamic mechanism design with hidden income and hidden actions
    • Doepke M., and Townsend R.M. Dynamic mechanism design with hidden income and hidden actions. Journal of Economic Theory 126 1 (2006) 235-285
    • (2006) Journal of Economic Theory , vol.126 , Issue.1 , pp. 235-285
    • Doepke, M.1    Townsend, R.M.2
  • 8
    • 35348950536 scopus 로고    scopus 로고
    • Strategic defense and attack for series and parallel reliability systems
    • Hausken Kjell. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research 186 2 (2008) 856-881
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 856-881
    • Hausken, Kjell.1
  • 11
    • 61449134971 scopus 로고    scopus 로고
    • Allocation of cost savings in a three-level supply chain with demand information sharing: A cooperative-game approach
    • Leng M., and Parlar M. Allocation of cost savings in a three-level supply chain with demand information sharing: A cooperative-game approach. Operations Research 57 1 (2009) 200-213
    • (2009) Operations Research , vol.57 , Issue.1 , pp. 200-213
    • Leng, M.1    Parlar, M.2
  • 13
    • 0036755349 scopus 로고    scopus 로고
    • Information sharing in a supply chain with horizontal competition
    • Li L. Information sharing in a supply chain with horizontal competition. Management Science 48 9 (2002) 1196-1212
    • (2002) Management Science , vol.48 , Issue.9 , pp. 1196-1212
    • Li, L.1
  • 14
    • 3142768279 scopus 로고    scopus 로고
    • The relevance of private information in mechanism design
    • Neeman Z. The relevance of private information in mechanism design. Journal of Economic Theory 117 1 (2004) 55-77
    • (2004) Journal of Economic Theory , vol.117 , Issue.1 , pp. 55-77
    • Neeman, Z.1
  • 16
    • 36049023055 scopus 로고    scopus 로고
    • Allocating defensive resources with private information about vulnerability
    • Powell R. Allocating defensive resources with private information about vulnerability. The American Political Science Review 101 4 (2007) 799-809
    • (2007) The American Political Science Review , vol.101 , Issue.4 , pp. 799-809
    • Powell, R.1
  • 17
    • 30844436627 scopus 로고    scopus 로고
    • The wrong kind of transparency
    • Prat A. The wrong kind of transparency. American Economic Review 95 3 (2005) 862-877
    • (2005) American Economic Review , vol.95 , Issue.3 , pp. 862-877
    • Prat, A.1
  • 19
    • 0037402019 scopus 로고    scopus 로고
    • Impact of demand correlation on the value of and incentives for information sharing in a supply chain
    • Raghunathan S. Impact of demand correlation on the value of and incentives for information sharing in a supply chain. European Journal of Operational Research 146 3 (2003) 634-649
    • (2003) European Journal of Operational Research , vol.146 , Issue.3 , pp. 634-649
    • Raghunathan, S.1
  • 20
    • 0030304298 scopus 로고    scopus 로고
    • Contest success functions
    • Skaperdas S. Contest success functions. Economic Theory 7 2 (1996) 283-290
    • (1996) Economic Theory , vol.7 , Issue.2 , pp. 283-290
    • Skaperdas, S.1
  • 22
    • 35348944407 scopus 로고    scopus 로고
    • Manufacturer's revenue-sharing contract and retail competition
    • Yao Z., Leung S.C.H., and Lai K.K. Manufacturer's revenue-sharing contract and retail competition. European Journal of Operational Research 186 2 (2008) 637-651
    • (2008) European Journal of Operational Research , vol.186 , Issue.2 , pp. 637-651
    • Yao, Z.1    Leung, S.C.H.2    Lai, K.K.3
  • 23
    • 61449167896 scopus 로고    scopus 로고
    • A Dynamic principal-agent model with hidden information: Sequential optimality through truthful state revelation
    • Zhang H., and Zenios S. A Dynamic principal-agent model with hidden information: Sequential optimality through truthful state revelation. Operations Research 56 3 (2008) 681-696
    • (2008) Operations Research , vol.56 , Issue.3 , pp. 681-696
    • Zhang, H.1    Zenios, S.2
  • 24
    • 38549098290 scopus 로고    scopus 로고
    • Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
    • Zhuang J., and Bier V.M. Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort. Operations Research 55 5 (2007) 976-991
    • (2007) Operations Research , vol.55 , Issue.5 , pp. 976-991
    • Zhuang, J.1    Bier, V.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.