2018
DOI: 10.1111/itor.12502
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity investments with nonlinear budget constraints and conservation laws: variational equilibrium, marginal expected utilities, and Lagrange multipliers

Abstract: In this paper, we propose a new cybersecurity investment supply chain game theory model, assuming that the demands for the product are known and fixed and, hence, the conservation law of each demand market is fulfilled. The model is a generalized Nash equilibrium model with nonlinear budget constraints for which we define the variational equilibrium, which provides us with a variational inequality formulation. We construct an equivalent formulation, enabling the analysis of the influence of the conservation la… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 32 publications
(45 reference statements)
0
20
0
Order By: Relevance
“…As in [1], the demand at each demand market j, d j , is assumed to be fixed and known and such that it satisfies the following conservation law:…”
Section: The Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…As in [1], the demand at each demand market j, d j , is assumed to be fixed and known and such that it satisfies the following conservation law:…”
Section: The Modelmentioning
confidence: 99%
“…As in [1], we assume that the demand price functions are continuously differentiable and are given byρ…”
Section: The Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…For the reasons given above among others, there is great interest for many types of problems arising in networks, in particular in wireless communications and/or its integration with the Internet, in the Operations Research community (for recent references on the topic, see, e.g., Ribeiro et al., ; Risso et al., ; Morais and Mateus, ; Pagès‐Bernaus et al., ; Ye et al., ). Likewise, game theory has proved to be an interesting tool with which to analyze different problems, such as allocation/sharing problems (see, e.g., Petrosjan and Zaccour, ; Moretti and Patrone, ; Nagarajan and Sošić., ; Ackermann et al., ; Guajardo and Rönnqvist, ; Gutiérrez et al., ) or cooperation (see, e.g., Ahmadi‐Javid and Hoseinpour, ; Basso et al., ; Quintero‐Araujo et al., ), from many different areas of knowledge, in particular in communication network problems (see, e.g., Acemoglu and Ozdaglar, ; Gozalvez et al., ; Zhu and Başar, ; Bahbouni and Moussa, ; Goyal and Kaushal, ; van Hove, ; Taleizadeh et al., ; Wang et al., ; Colajanni et al., ; Geng and Mallik, ; Zeng et al., ). Furthermore, game theory has been also utilized to analyze engineering problems in the broadest sense (Sanchez‐Soriano, ).…”
Section: Introductionmentioning
confidence: 99%