2006
DOI: 10.1016/j.jcss.2006.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Inoculation strategies for victims of viruses and the sum-of-squares partition problem

Abstract: We propose a simple game for modeling containment of the spread of viruses in a graph of n nodes. Each node must choose to either install anti-virus software at some known cost C, or risk infection and a loss L if a virus that starts at a random initial point in the graph can reach it without being stopped by some intermediate node. We prove many game theoretic properties of the model, including an easily applied characterization of Nash equilibria, culminating in our showing that a centralized solution can gi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
176
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 135 publications
(177 citation statements)
references
References 25 publications
1
176
0
Order By: Relevance
“…The authors of [15] design a mediator that implements a correlated equilibrium for a virus inoculation game [6,24]. In this game, there are n players, each corresponding to a node in a square grid.…”
Section: Mediation Metricsmentioning
confidence: 99%
“…The authors of [15] design a mediator that implements a correlated equilibrium for a virus inoculation game [6,24]. In this game, there are n players, each corresponding to a node in a square grid.…”
Section: Mediation Metricsmentioning
confidence: 99%
“…For example, the work of Hayrapetyan et al [22] and others [3,12] fully utilizes the social-network structure to "cut off" and contain various diffusive processes in a social network. As mentioned earlier, all this work is only concerned with vaccinating a set of nodes before the infection begins, however, and does not have the temporal component of the Firefighter problem.…”
Section: Minbudget(g S T )mentioning
confidence: 99%
“…Questions about the spread of disease and epidemics in a social network have often been modeled using graph theory (e.g. [3,11]), and correspond to fundamental graph-theoretic concepts [22]. Moreover, these graph theoretic principles can be applied to many diffusive network processes, including epidemics in computer networks, the spread of innovations and ideas, and viral marketing [23].…”
Section: Introductionmentioning
confidence: 99%
“…We plan to expand the analysis to different behavioral assumptions to narrow the gap between formal analysis and empirical observations in the field and the laboratory [17]. 6 Notwithstanding, we expect that the result provided in this paper will be of interest to security practitioners and researchers alike.…”
Section: Loosely and Tightly Coupled Contribution Functionsmentioning
confidence: 99%