Network Security and Contagion
暂无分享,去创建一个
Asuman E. Ozdaglar | Azarakhsh Malekian | Daron Acemoglu | A. Ozdaglar | D. Acemoglu | Azarakhsh Malekian
[1] A. Tahbaz-Salehi,et al. Systemic Risk and Stability in Financial Networks , 2013 .
[2] Nizar Allouch,et al. On the Private Provision of Public Goods on Networks , 2012, J. Econ. Theory.
[3] Sanjeev Goyal,et al. A Noncooperative Model of Network Formation , 2000 .
[4] Andrea Galeotti,et al. Strategic immunization and group structure , 2013 .
[5] Bruce A. Reed,et al. The Size of the Giant Component of a Random Graph with a Given Degree Sequence , 1998, Combinatorics, Probability and Computing.
[6] Mariagiovanna Baccara,et al. How to Organize Crime , 2006 .
[7] Heski Bar-Isaac,et al. How to Organize Crime , 2006 .
[8] M. Newman,et al. Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[9] J. Goodman. Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .
[10] Alex Bavelas,et al. Communication Patterns in Task‐Oriented Groups , 1950 .
[11] S. Goyal,et al. Robust Networks , 2009 .
[12] K. D. Jaegher,et al. Strategic Network Disruption and Defense , 2016 .
[13] Dan Kovenock,et al. The Optimal Defense of Networks of Targets , 2018 .
[14] Robert R. Moeller,et al. Network Security , 1993, Inf. Secur. J. A Glob. Perspect..
[15] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[16] M. Jackson,et al. A Strategic Model of Social and Economic Networks , 1996 .
[17] Sanders Jl,et al. Quantitative guidelines for communicable disease control programs. , 1971 .
[18] Antoni Calvó-Armengol,et al. Centre De Referència En Economia Analítica Barcelona Economics Working Paper Series Working Paper Nº 178 Who's Who in Networks. Wanted: the Key Player Who's Who in Networks. Wanted: the Key Player Barcelona Economics Wp Nº 178 , 2022 .
[19] S. Sethi,et al. Quantitative guidelines for communicable disease control program: a complete synthesis. , 1974, Biometrics.
[20] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[21] S. Goldman,et al. Cost Optimization in the SIS Model of Infectious Disease with Treatment , 2002 .
[22] Rachel Kranton,et al. Risk-Sharing Networks , 2005 .
[23] Yves Zenou,et al. Peer Effects and Social Networks in Education , 2008, SSRN Electronic Journal.
[24] S. Goyal,et al. Attack, Defence, and Contagion in Networks , 2014 .
[25] Fernando Vega-Redondo,et al. Complex Social Networks: Searching in Social Networks , 2007 .
[26] Robert E. Tarjan,et al. Dividing a Graph into Triconnected Components , 1973, SIAM J. Comput..
[27] P. Geoffard,et al. Disease Eradication: Private versus Public Vaccination , 1997 .
[28] R. Kranton,et al. Strategic Interaction and Networks , 2010 .
[29] D. de Meza,et al. The Social Efficiency of Private Decisions to Enforce Property Rights , 1992, Journal of Political Economy.
[30] F. Chung,et al. Connected Components in Random Graphs with Given Expected Degree Sequences , 2002 .
[31] Éva Tardos,et al. Network games , 2004, STOC '04.
[32] Bruce A. Reed,et al. A Critical Point for Random Graphs with a Given Degree Sequence , 1995, Random Struct. Algorithms.
[33] Alan R. Simon,et al. Network security , 1994 .
[34] B. Golub,et al. How Homophily Affects the Speed of Learning and Best Response Dynamics , 2012 .
[35] Yann Bramoullé,et al. Public goods in networks , 2007, J. Econ. Theory.
[36] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[37] M. Intriligator,et al. Externalities and compulsary vaccinations , 1991 .