-
1
-
-
84990029315
-
The economics of information security investment
-
Nov
-
L. A. Gordon and M. P. Loeb, "The economics of information security investment," Trans. Inf. Syst. Security, vol. 5, no. 4, pp. 438-457, Nov. 2002.
-
(2002)
Trans. Inf. Syst. Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
2
-
-
33750482906
-
System reliability and free riding
-
New York: Springer
-
H. R. Varian, "System reliability and free riding," in Economics of Information Security. New York: Springer, 2004, pp. 1-15.
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.R.1
-
3
-
-
0037786763
-
Interdependent security
-
H. Kunreuther and G. Heal, "Interdependent security," J. Risk Uncertainty, vol. 26, no. 2, pp. 231-249, 2003.
-
(2003)
J. Risk Uncertainty
, vol.26
, Issue.2
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
5
-
-
20744452623
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms
-
J. Aspnes, K. Chang, and A. Yampolskiy, "Inoculation strategies for victims of viruses and the sum-of-squares partition problem," in Proc. 16th Annual ACM-SIAM SODA, 2005, pp. 43-52. (Pubitemid 40851356)
-
(2005)
Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 43-52
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
6
-
-
65249113754
-
Efficiency of selfish investment in network security
-
Seattle, WA Aug
-
L. Jiang, V. Anantharam, and J.Walrand, "Efficiency of selfish investment in network security," in Proc. ACM SIGCOMM NetEcon, Seattle, WA, Aug. 2008, pp. 31-36.
-
(2008)
Proc. ACM SIGCOMM NetEcon
, pp. 31-36
-
-
Jiang, L.1
Anantharam, V.2
Walrand, J.3
-
7
-
-
65249114132
-
A local mean field analysis of security investments in networks
-
Seattle, WA, Aug
-
M. Lelarge and J. Bolot, "A local mean field analysis of security investments in networks," in Proc. ACM SIGCOMM NetEcon, Seattle, WA, Aug. 2008, pp. 25-30.
-
(2008)
Proc. ACM SIGCOMM NetEcon
, pp. 25-30
-
-
Lelarge, M.1
Bolot, J.2
-
9
-
-
0038183237
-
How bad is selfish routing
-
Mar
-
T. Roughgarden and É. Tardos, "How bad is selfish routing," J. ACM, vol. 49, no. 2, pp. 236-259, Mar. 2002.
-
(2002)
J. ACM
, vol.49
, Issue.2
, pp. 236-259
-
-
Roughgarden, T.1
Tardos, E.2
-
11
-
-
33847324859
-
Competition and efficiency in congested markets
-
DOI 10.1287/moor.1060.0231
-
D. Acemoglu and A. Ozdaglar, "Competition and efficiency in congested markets," Math. Oper. Res., vol. 32, no. 1, pp. 1-31, 2007. (Pubitemid 46325351)
-
(2007)
Mathematics of Operations Research
, vol.32
, Issue.1
, pp. 1-31
-
-
Acemoglu, D.1
Ozdaglar, A.2
-
12
-
-
79955469649
-
-
MIT, Cambridge, MA, LIDS rep
-
A. Ozdaglar, "Price competition with elastic traffic," MIT, Cambridge, MA, LIDS rep., 2006.
-
(2006)
Price Competition with Elastic Traffic
-
-
Ozdaglar, A.1
-
13
-
-
5544317207
-
Efficiency loss in a network resource allocation game
-
R. Johari and J. N. Tsitsiklis, "Efficiency loss in a network resource allocation game," Math. Oper. Res., vol. 29, no. 3, pp. 407-435, 2004.
-
(2004)
Math. Oper. Res.
, vol.29
, Issue.3
, pp. 407-435
-
-
Johari, R.1
Tsitsiklis, J.N.2
-
14
-
-
52449084729
-
The role of game theory in information warfare
-
Vancouver, BC, Canada
-
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, "The role of game theory in information warfare," in Proc. 4th Inf. Survivability Workshop, Vancouver, BC, Canada, 2002.
-
(2002)
Proc. 4th Inf. Survivability Workshop
-
-
Hamilton, S.N.1
Miller, W.L.2
Ott, A.3
Saydjari, O.S.4
-
15
-
-
56249136559
-
Challenges in applying game theory to the domain of information warfare
-
Vancouver, BC, Canada
-
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, "Challenges in applying game theory to the domain of information warfare," in Proc. 4th Inf. Survivability Workshop, Vancouver, BC, Canada, 2002.
-
(2002)
Proc. 4th Inf. Survivability Workshop
-
-
Hamilton, S.N.1
Miller, W.L.2
Ott, A.3
Saydjari, O.S.4
-
16
-
-
62949149491
-
Security in networks: A game-theoretic approach
-
Cancun, Mexico, Dec
-
A. Gueye and J. Walrand, "Security in networks: A game-theoretic approach," in Proc. IEEE CDC, Cancun, Mexico, Dec. 2008, pp. 829-834.
-
(2008)
Proc. IEEE CDC
, pp. 829-834
-
-
Gueye, A.1
Walrand, J.2
-
18
-
-
0002430114
-
Subjectivity and correlation in randomized strategies
-
R. J. Aumann, "Subjectivity and correlation in randomized strategies," J. Math. Econ., vol. 1, pp. 67-96, 1974.
-
(1974)
J. Math. Econ.
, vol.1
, pp. 67-96
-
-
Aumann, R.J.1
-
19
-
-
0003252343
-
Bayesian equilibrium and incentive compatibility: An introduction
-
L. Hurwicz, D. Schmeidler, and H. Sonnenschein, Eds. Cambridge, U.K.: Cambridge Univ. Press
-
R. B. Myerson, "Bayesian equilibrium and incentive compatibility: An introduction," in Social Goals and Social Organization: Essays in Honor of Elizha Pazner, L. Hurwicz, D. Schmeidler, and H. Sonnenschein, Eds. Cambridge, U.K.: Cambridge Univ. Press, 1985.
-
(1985)
Social Goals and Social Organization: Essays in Honor of Elizha Pazner
-
-
Myerson, R.B.1
-
20
-
-
0031256580
-
Dual reduction and elementary games
-
DOI 10.1006/game.1997.0573, PII S089982569790573X
-
R. B. Myerson, "Dual reduction and elementary games," Games Econ. Behav., vol. 21, no. 1-2, pp. 183-202, 1997. (Pubitemid 127175531)
-
(1997)
Games and Economic Behavior
, vol.21
, Issue.1-2
, pp. 183-202
-
-
Myerson, R.B.1
-
21
-
-
0031256578
-
Calibrated learning and correlated equilibrium
-
DOI 10.1006/game.1997.0595, PII S0899825697905959
-
D. Foster and R. Vohra, "Calibrated learning and correlated equilibrium," Games Econ. Behav., vol. 21, pp. 40-55, 1997. (Pubitemid 127175523)
-
(1997)
Games and Economic Behavior
, vol.21
, Issue.1-2
, pp. 40-55
-
-
Foster, D.P.1
Vohra, R.V.2
-
22
-
-
33947600544
-
Learning correlated equilibria in games with compact sets of strategies
-
Apr
-
G. Stoltz and G. Lugosi, "Learning correlated equilibria in games with compact sets of strategies," Games Econ. Behav., vol. 59, no. 1, pp. 187-208, Apr. 2007.
-
(2007)
Games Econ. Behav.
, vol.59
, Issue.1
, pp. 187-208
-
-
Stoltz, G.1
Lugosi, G.2
-
23
-
-
0018922522
-
Existence and uniqueness of equilibrium points for concave N-person games
-
Jul
-
J. B. Rosen, "Existence and uniqueness of equilibrium points for concave N-person games," Econometrica, vol. 33, pp. 520-534, Jul. 1965.
-
(1965)
Econometrica
, vol.33
, pp. 520-534
-
-
Rosen, J.B.1
-
25
-
-
79955464386
-
How Bad Are Selfish Investments in Network Security?
-
L. Jiang, V. Anantharam, and J. Walrand, "How bad are selfish investments in network security?," UC Berkeley, Berkeley, CA, Tech. Rep., Dec. 2008 [Online]. Available: http://www.eecs.berkeley.edu/ Pubs/TechRpts/2008/EECS-2008-183.html
-
(2008)
UC Berkeley, Berkeley, CA, Tech. Rep. Dec
-
-
Jiang, L.1
Anantharam, V.2
Walrand, J.3
|