ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Interdependent Security Games Under Behavioral Probability Weighting
Lecture Notes in Computer Science - Decision and Game Theory for Security
◽
10.1007/978-3-319-25594-1_9
◽
2015
◽
pp. 150-169
◽
Cited By ~ 3
Author(s):
Ashish R. Hota
◽
Shreyas Sundaram
Keyword(s):
Probability Weighting
◽
Security Games
◽
Interdependent Security
Download Full-text
Related Documents
Cited By
References
Interdependent Security Games on Networks Under Behavioral Probability Weighting
IEEE Transactions on Control of Network Systems
◽
10.1109/tcns.2016.2600484
◽
2018
◽
Vol 5
(1)
◽
pp. 262-273
◽
Cited By ~ 17
Author(s):
Ashish R. Hota
◽
Shreyas Sundaram
Keyword(s):
Probability Weighting
◽
Security Games
◽
Interdependent Security
Download Full-text
Evolutionary dynamics of the interdependent security games on complex network
Applied Mathematics and Computation
◽
10.1016/j.amc.2021.126051
◽
2021
◽
Vol 399
◽
pp. 126051
Author(s):
Zhen Wang
◽
Chaofan Li
◽
Xing Jin
◽
Hong Ding
◽
Guanghai Cui
◽
...
Keyword(s):
Complex Network
◽
Evolutionary Dynamics
◽
Security Games
◽
Interdependent Security
Download Full-text
Uncertainty in Interdependent Security Games
Lecture Notes in Computer Science - Decision and Game Theory for Security
◽
10.1007/978-3-642-17197-0_16
◽
2010
◽
pp. 234-244
◽
Cited By ~ 17
Author(s):
Benjamin Johnson
◽
Jens Grossklags
◽
Nicolas Christin
◽
John Chuang
Keyword(s):
Security Games
◽
Interdependent Security
Download Full-text
Incentivizing effort in interdependent security games using resource pooling
Proceedings of the 14th Workshop on the Economics of Networks, Systems and Computation - NetEcon '19
◽
10.1145/3338506.3340272
◽
2019
◽
Cited By ~ 1
Author(s):
Mohammad Mahdi Khalili
◽
Xueru Zhang
◽
Mingyan Liu
Keyword(s):
Resource Pooling
◽
Security Games
◽
Interdependent Security
Download Full-text
Cascade of coordinated behaviors in interdependent security games
The 6th International Conference on Soft Computing and Intelligent Systems, and The 13th International Symposium on Advanced Intelligence Systems
◽
10.1109/scis-isis.2012.6504997
◽
2012
◽
Author(s):
Takanori Komatsu
◽
Akira Namatame
Keyword(s):
Security Games
◽
Interdependent Security
Download Full-text
Spatial externalities and risk in interdependent security games
Journal of Risk and Uncertainty
◽
10.1007/s11166-018-9280-8
◽
2018
◽
Vol 56
(3)
◽
pp. 237-257
◽
Cited By ~ 1
Author(s):
Stephan Kroll
◽
Aric P. Shafran
Keyword(s):
Spatial Externalities
◽
Security Games
◽
Interdependent Security
Download Full-text
A Framework for Computational Strategic Analysis: Applications to Iterated Interdependent Security Games
Computational Economics
◽
10.1007/s10614-014-9431-1
◽
2014
◽
Vol 45
(3)
◽
pp. 469-500
◽
Cited By ~ 1
Author(s):
Yevgeniy Vorobeychik
◽
Steven Kimbrough
◽
Howard Kunreuther
Keyword(s):
Strategic Analysis
◽
Security Games
◽
Interdependent Security
Download Full-text
Resource Pooling for Shared Fate: Incentivizing Effort in Interdependent Security Games through Cross-investments
IEEE Transactions on Control of Network Systems
◽
10.1109/tcns.2020.3042710
◽
2020
◽
pp. 1-1
Author(s):
Mohammad Mahdi Khalili
◽
Xueru Zhang
◽
Mingyan Liu
Keyword(s):
Resource Pooling
◽
Security Games
◽
Shared Fate
◽
Interdependent Security
Download Full-text
The Effect of Risk Perceived Payoffs in Iterated Interdependent Security Games
Lecture Notes in Computer Science - Artificial Life and Computational Intelligence
◽
10.1007/978-3-319-28270-1_29
◽
2016
◽
pp. 348-359
Author(s):
Ayman Ghoneim
◽
Kamran Shafi
Keyword(s):
Security Games
◽
Interdependent Security
Download Full-text
Budget balance or voluntary participation? Incentivizing investments in interdependent security games
2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
◽
10.1109/allerton.2014.7028578
◽
2014
◽
Cited By ~ 2
Author(s):
Parinaz Naghizadeh
◽
Mingyan Liu
Keyword(s):
Voluntary Participation
◽
Budget Balance
◽
Security Games
◽
Interdependent Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close