2015
DOI: 10.2139/ssrn.2574178
|View full text |Cite
|
Sign up to set email alerts
|

Network Design and Imperfect Defense

Abstract: Standard-Nutzungsbedingungen:Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Zwecken und zum Privatgebrauch gespeichert und kopiert werden.Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich machen, vertreiben oder anderweitig nutzen.Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Such defense is modeled as taking place on an existing network (Acemoglu et al 2016;Kovenock and Roberson 2018). Alternatively, the centralized player also designs the network itself (Dziubiński and Goyal 2013;Goyal and Vigier 2014;Landwehr 2015; see Endres et al (2019) for an experimental analysis of such models). Dziubiński and Goyal (2017) additionally consider the case where defense of the nodes takes place in a decentralized manner, but the network is exogenously given.…”
Section: Literature On Network Disruptionmentioning
confidence: 99%
“…Such defense is modeled as taking place on an existing network (Acemoglu et al 2016;Kovenock and Roberson 2018). Alternatively, the centralized player also designs the network itself (Dziubiński and Goyal 2013;Goyal and Vigier 2014;Landwehr 2015; see Endres et al (2019) for an experimental analysis of such models). Dziubiński and Goyal (2017) additionally consider the case where defense of the nodes takes place in a decentralized manner, but the network is exogenously given.…”
Section: Literature On Network Disruptionmentioning
confidence: 99%
“…Third, in both frameworks it is difficult to obtain general results when imperfect defense is introduced. However, Landwehr [21] provides equilibrium strategies for D when the number of attacks is very small. In particular, he establishes that if k = 2, then there exist 6 types of strategies that D may play in equilibrium according to the value of π, cP , and cL.…”
Section: Propositionmentioning
confidence: 99%
“…If e is a link and i and j are nodes such thatψ(e) = (i, j), then e is said to join i and j. 21 We define the adjacency matrix M(ĝ) of a multigraphĝ = (N ,Ê,ψ) as ∀(a, b) ∈Ê 2 , M a,b (ĝ) = #{e ∈Ê :ψ(e) = (a, b)}, i.e. the number of links between nodes a and b inĝ.…”
Section: Multigraphsmentioning
confidence: 99%
See 2 more Smart Citations