Skip to main content
Erschienen in: Dynamic Games and Applications 2/2021

21.07.2020

Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks

verfasst von: Juntao Chen, Quanyan Zhu, Tamer Başar

Erschienen in: Dynamic Games and Applications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The interconnectivity of cyber and physical systems and Internet of things has created ubiquitous concerns of cyber threats for enterprise system managers. It is common that the asset owners and enterprise network operators need to work with cybersecurity professionals to manage the risk by remunerating them for their efforts that are not directly observable. In this paper, we use a principal–agent framework to capture the service relationships between the two parties, i.e., the asset owner (principal) and the cyber risk manager (agent). Specifically, we consider a dynamic systemic risk management problem with asymmetric information where the principal can only observe cyber risk outcomes of the enterprise network rather than directly the efforts that the manager expends on protecting the resources. Under this information pattern, the principal aims to minimize the systemic cyber risks by designing a dynamic contract that specifies the compensation flows and the anticipated efforts of the manager by taking into account his incentives and rational behaviors. We formulate a bi-level mechanism design problem for dynamic contract design within the framework of a class of stochastic differential games. We show that the principal has rational controllability of the systemic risk by designing an incentive compatible estimator of the agent’s hidden efforts. We characterize the optimal solution by reformulating the problem as a stochastic optimal control program which can be solved using dynamic programming. We further investigate a benchmark scenario with complete information and identify conditions that yield zero information rent and lead to a new certainty equivalence principle for principal–agent problems. Finally, case studies over networked systems are carried out to illustrate the theoretical results obtained.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The principal refers to the network/asset owner, and the agent refers to the risk manager or security professional which are used interchangeably.
 
Literatur
1.
Zurück zum Zitat Acemoglu D, Ozdaglar A, Tahbaz-Salehi A (2015) Systemic risk and stability in financial networks. Am Econ Rev 105(2):564–608 Acemoglu D, Ozdaglar A, Tahbaz-Salehi A (2015) Systemic risk and stability in financial networks. Am Econ Rev 105(2):564–608
2.
3.
Zurück zum Zitat Aumann RJ, Maschler M, Stearns RE (1995) Repeated games with incomplete information. MIT Press, Cambridge Aumann RJ, Maschler M, Stearns RE (1995) Repeated games with incomplete information. MIT Press, Cambridge
4.
Zurück zum Zitat Başar T (1985) An equilibrium theory for multiperson decision making with multiple probabilistic models. IEEE Trans Autom Control 30(2):118–132MathSciNetMATH Başar T (1985) An equilibrium theory for multiperson decision making with multiple probabilistic models. IEEE Trans Autom Control 30(2):118–132MathSciNetMATH
5.
Zurück zum Zitat Baldwin A, Gheyas I, Ioannidis C, Pym D, Williams J (2017) Contagion in cyber security attacks. J Oper Res Soc 68(7):780–791 Baldwin A, Gheyas I, Ioannidis C, Pym D, Williams J (2017) Contagion in cyber security attacks. J Oper Res Soc 68(7):780–791
6.
Zurück zum Zitat Bansal R, Başar T (1987) Stochastic teams with nonclassical information revisited: when is an affine law optimal? IEEE Trans Autom Control 32(6):554–559MathSciNetMATH Bansal R, Başar T (1987) Stochastic teams with nonclassical information revisited: when is an affine law optimal? IEEE Trans Autom Control 32(6):554–559MathSciNetMATH
7.
Zurück zum Zitat Başar T (1984) Affine incentive schemes for stochastic systems with dynamic information. SIAM J Control Optim 22(2):199–210MathSciNetMATH Başar T (1984) Affine incentive schemes for stochastic systems with dynamic information. SIAM J Control Optim 22(2):199–210MathSciNetMATH
8.
Zurück zum Zitat Başar T (1989) Stochastic incentive problems with partial dynamic information and multiple levels of hierarchy. Eur J Polit Econ 5(2–3):203–217 Başar T (1989) Stochastic incentive problems with partial dynamic information and multiple levels of hierarchy. Eur J Polit Econ 5(2–3):203–217
9.
Zurück zum Zitat Başar T (2014) Stochastic differential games and intricacy of information structures. In Haunschmied J, Veliov VM, Wrzaczek S (eds) Dynamic games in economics. Springer, Berlin, pp 23–49 Başar T (2014) Stochastic differential games and intricacy of information structures. In Haunschmied J, Veliov VM, Wrzaczek S (eds) Dynamic games in economics. Springer, Berlin, pp 23–49
10.
Zurück zum Zitat Başar T, Bansal R (1994) Optimum design of measurement channels and control policies for linear-quadratic stochastic systems. Eur J Oper Res 73(2):226–236MATH Başar T, Bansal R (1994) Optimum design of measurement channels and control policies for linear-quadratic stochastic systems. Eur J Oper Res 73(2):226–236MATH
11.
Zurück zum Zitat Biais B, Mariotti T, Rochet JC, Villeneuve S (2010) Large risks, limited liability, and dynamic moral hazard. Econometrica 78(1):73–118MathSciNetMATH Biais B, Mariotti T, Rochet JC, Villeneuve S (2010) Large risks, limited liability, and dynamic moral hazard. Econometrica 78(1):73–118MathSciNetMATH
12.
Zurück zum Zitat Bisias D, Flood M, Lo AW, Valavanis S (2012) A survey of systemic risk analytics. Annu Rev Financ Econ 4(1):255–296 Bisias D, Flood M, Lo AW, Valavanis S (2012) A survey of systemic risk analytics. Annu Rev Financ Econ 4(1):255–296
13.
Zurück zum Zitat Cansever DH, Başar T (1985) On stochastic incentive control problems with partial dynamic information. Syst Control Lett 6(1):69–75MathSciNetMATH Cansever DH, Başar T (1985) On stochastic incentive control problems with partial dynamic information. Syst Control Lett 6(1):69–75MathSciNetMATH
14.
Zurück zum Zitat Cardaliaguet P (2007) Differential games with asymmetric information. SIAM J Control Optim 46(3):816–838MathSciNetMATH Cardaliaguet P (2007) Differential games with asymmetric information. SIAM J Control Optim 46(3):816–838MathSciNetMATH
15.
Zurück zum Zitat Cardaliaguet P, Rainer C (2009) On a continuous-time game with incomplete information. Math Oper Res 34(4):769–794MathSciNetMATH Cardaliaguet P, Rainer C (2009) On a continuous-time game with incomplete information. Math Oper Res 34(4):769–794MathSciNetMATH
16.
Zurück zum Zitat Carmona R, Fouque JP, Sun LH (2015) Mean field games and systemic risk. Commun Math Sci 13(4):911–933MathSciNetMATH Carmona R, Fouque JP, Sun LH (2015) Mean field games and systemic risk. Commun Math Sci 13(4):911–933MathSciNetMATH
17.
Zurück zum Zitat Charalambous CD (1997) The role of information state and adjoint in relating nonlinear output feedback risk-sensitive control and dynamic games. IEEE Trans Autom Control 42(8):1163–1170MathSciNetMATH Charalambous CD (1997) The role of information state and adjoint in relating nonlinear output feedback risk-sensitive control and dynamic games. IEEE Trans Autom Control 42(8):1163–1170MathSciNetMATH
18.
Zurück zum Zitat Chen J, Touati C, Zhu Q (2020) A dynamic game approach to strategic design of secure and resilient infrastructure network. IEEE Trans Inf Forensics Secur 15:462–474 Chen J, Touati C, Zhu Q (2020) A dynamic game approach to strategic design of secure and resilient infrastructure network. IEEE Trans Inf Forensics Secur 15:462–474
19.
Zurück zum Zitat Chen J, Touati C, Zhu Q (2020) Optimal secure two-layer IoT network design. IEEE Trans Control Netw Syst 7(1):398–409MathSciNetMATH Chen J, Touati C, Zhu Q (2020) Optimal secure two-layer IoT network design. IEEE Trans Control Netw Syst 7(1):398–409MathSciNetMATH
20.
Zurück zum Zitat Chen J, Zhu Q (2017) Security as a service for cloud-enabled Internet of controlled things under advanced persistent threats: a contract design approach. IEEE Trans Inf Forensics Secur 12(11):2736–2750 Chen J, Zhu Q (2017) Security as a service for cloud-enabled Internet of controlled things under advanced persistent threats: a contract design approach. IEEE Trans Inf Forensics Secur 12(11):2736–2750
21.
Zurück zum Zitat Chen J, Zhu Q (2018) A linear quadratic differential game approach to dynamic contract design for systemic cyber risk management under asymmetric information. In: 56th annual Allerton conference on communication, control, and computing (Allerton), pp 575–582 Chen J, Zhu Q (2018) A linear quadratic differential game approach to dynamic contract design for systemic cyber risk management under asymmetric information. In: 56th annual Allerton conference on communication, control, and computing (Allerton), pp 575–582
22.
Zurück zum Zitat Chen J, Zhu Q (2019) Interdependent strategic security risk management with bounded rationality in the Internet of things. IEEE Trans Inf Forensics Secur 14(11):2958–2971 Chen J, Zhu Q (2019) Interdependent strategic security risk management with bounded rationality in the Internet of things. IEEE Trans Inf Forensics Secur 14(11):2958–2971
23.
Zurück zum Zitat Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27 Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27
24.
25.
Zurück zum Zitat Crowther KG, Haimes YY (2005) Application of the inoperability input–output model (IIM) for systemic risk assessment and management of interdependent infrastructures. Syst Eng 8(4):323–341 Crowther KG, Haimes YY (2005) Application of the inoperability input–output model (IIM) for systemic risk assessment and management of interdependent infrastructures. Syst Eng 8(4):323–341
26.
Zurück zum Zitat Cvitanic J, Zhang J (2013) Contract theory in continuous-time models. Springer, BerlinMATH Cvitanic J, Zhang J (2013) Contract theory in continuous-time models. Springer, BerlinMATH
27.
Zurück zum Zitat Eisenberg L, Noe TH (2001) Systemic risk in financial systems. Manag Sci 47(2):236–249MATH Eisenberg L, Noe TH (2001) Systemic risk in financial systems. Manag Sci 47(2):236–249MATH
28.
Zurück zum Zitat Elliott M, Golub B, Jackson MO (2014) Financial networks and contagion. Am Econ Rev 104(10):3115–53 Elliott M, Golub B, Jackson MO (2014) Financial networks and contagion. Am Econ Rev 104(10):3115–53
29.
Zurück zum Zitat Fielder A, König S, Panaousis E, Schauer S, Rass S (2018) Risk assessment uncertainties in cybersecurity investments. Games 9(2):34MathSciNetMATH Fielder A, König S, Panaousis E, Schauer S, Rass S (2018) Risk assessment uncertainties in cybersecurity investments. Games 9(2):34MathSciNetMATH
30.
Zurück zum Zitat Fouque JP, Ichiba T (2013) Stability in a model of interbank lending. SIAM J Financ Math 4(1):784–803MathSciNetMATH Fouque JP, Ichiba T (2013) Stability in a model of interbank lending. SIAM J Financ Math 4(1):784–803MathSciNetMATH
31.
Zurück zum Zitat Fouque JP, Langsam JA (2013) Handbook on systemic risk. Cambridge University Press, CambridgeMATH Fouque JP, Langsam JA (2013) Handbook on systemic risk. Cambridge University Press, CambridgeMATH
32.
Zurück zum Zitat Garnier J, Papanicolaou G, Yang TW (2013) Diversification in financial networks may increase systemic risk. In: Fouque J, Langsam J (eds) Handbook on systemic risk. Cambridge University Press, Cambridge, pp 432–443 Garnier J, Papanicolaou G, Yang TW (2013) Diversification in financial networks may increase systemic risk. In: Fouque J, Langsam J (eds) Handbook on systemic risk. Cambridge University Press, Cambridge, pp 432–443
33.
Zurück zum Zitat Gershkov A, Moldovanu B (2014) Dynamic allocation and pricing: a mechanism design approach, vol 9. MIT Press, CambridgeMATH Gershkov A, Moldovanu B (2014) Dynamic allocation and pricing: a mechanism design approach, vol 9. MIT Press, CambridgeMATH
34.
Zurück zum Zitat Gupta A, Langbort C, Başar T (2016) Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems. IEEE Trans Control Netw Syst 4(1):71–81MathSciNetMATH Gupta A, Langbort C, Başar T (2016) Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems. IEEE Trans Control Netw Syst 4(1):71–81MathSciNetMATH
35.
Zurück zum Zitat Gupta A, Nayyar A, Langbort C, Başar T (2014) Common information based Markov perfect equilibria for linear-Gaussian games with asymmetric information. SIAM J Control Optim 52(5):3228–3260MathSciNetMATH Gupta A, Nayyar A, Langbort C, Başar T (2014) Common information based Markov perfect equilibria for linear-Gaussian games with asymmetric information. SIAM J Control Optim 52(5):3228–3260MathSciNetMATH
36.
Zurück zum Zitat Hansen EA, Bernstein DS, Zilberstein S (2004) Dynamic programming for partially observable stochastic games. AAAI 4:709–715 Hansen EA, Bernstein DS, Zilberstein S (2004) Dynamic programming for partially observable stochastic games. AAAI 4:709–715
37.
Zurück zum Zitat Helbing D (2013) Globally networked risks and how to respond. Nature 497(7447):51–59 Helbing D (2013) Globally networked risks and how to respond. Nature 497(7447):51–59
38.
Zurück zum Zitat Huang Y, Kavitha V, Zhu Q (2019) Continuous-time Markov decision processes with controlled observations. In: Annual Allerton conference on communication, control, and computing (Allerton), pp 32–39 Huang Y, Kavitha V, Zhu Q (2019) Continuous-time Markov decision processes with controlled observations. In: Annual Allerton conference on communication, control, and computing (Allerton), pp 32–39
39.
Zurück zum Zitat James MR, Baras J (1996) Partially observed differential games, infinite-dimensional Hamilton–Jacobi–Isaacs equations, and nonlinear \({H}_\infty \) control. SIAM J Control Optim 34(4):1342–1364MathSciNetMATH James MR, Baras J (1996) Partially observed differential games, infinite-dimensional Hamilton–Jacobi–Isaacs equations, and nonlinear \({H}_\infty \) control. SIAM J Control Optim 34(4):1342–1364MathSciNetMATH
40.
Zurück zum Zitat James MR, Baras JS, Elliott RJ (1994) Risk-sensitive control and dynamic games for partially observed discrete-time nonlinear systems. IEEE Trans Autom Control 39(4):780–792MathSciNetMATH James MR, Baras JS, Elliott RJ (1994) Risk-sensitive control and dynamic games for partially observed discrete-time nonlinear systems. IEEE Trans Autom Control 39(4):780–792MathSciNetMATH
41.
Zurück zum Zitat Karatzas I, Shreve S (2012) Brownian motion and stochastic calculus. Springer, BerlinMATH Karatzas I, Shreve S (2012) Brownian motion and stochastic calculus. Springer, BerlinMATH
43.
Zurück zum Zitat Khalili MM, Naghizadeh P, Liu M (2018) Designing cyber insurance policies: the role of pre-screening and security interdependence. IEEE Trans Inf Forensics Secur 13(9):2226–2239 Khalili MM, Naghizadeh P, Liu M (2018) Designing cyber insurance policies: the role of pre-screening and security interdependence. IEEE Trans Inf Forensics Secur 13(9):2226–2239
44.
Zurück zum Zitat Knowles W, Prince D, Hutchison D, Disso JFP, Jones K (2015) A survey of cyber security management in industrial control systems. Int J Crit Infrastruct Prot 9:52–80 Knowles W, Prince D, Hutchison D, Disso JFP, Jones K (2015) A survey of cyber security management in industrial control systems. Int J Crit Infrastruct Prot 9:52–80
45.
Zurück zum Zitat Kushner HJ (1990) Numerical methods for stochastic control problems in continuous time. SIAM J Control Optim 28(5):999–1048MathSciNetMATH Kushner HJ (1990) Numerical methods for stochastic control problems in continuous time. SIAM J Control Optim 28(5):999–1048MathSciNetMATH
46.
Zurück zum Zitat Li J, Ou X, Rajagopalan R (2010) Uncertainty and risk management in cyber situational awareness. In: Jajodia S, Liu P, Swarup V, Wang C (eds) Cyber situational awareness. Advances in information security, vol 46. Springer, Boston, pp 51–68 Li J, Ou X, Rajagopalan R (2010) Uncertainty and risk management in cyber situational awareness. In: Jajodia S, Liu P, Swarup V, Wang C (eds) Cyber situational awareness. Advances in information security, vol 46. Springer, Boston, pp 51–68
47.
Zurück zum Zitat Manshaei MH, Zhu Q, Alpcan T, Başar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv (CSUR) 45(3):1–39MATH Manshaei MH, Zhu Q, Alpcan T, Başar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv (CSUR) 45(3):1–39MATH
48.
Zurück zum Zitat Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: Annual Allerton conference on communication, control, and computing, pp 252–260 Miura-Ko RA, Yolken B, Bambos N, Mitchell J (2008) Security investment games of interdependent organizations. In: Annual Allerton conference on communication, control, and computing, pp 252–260
49.
Zurück zum Zitat Nguyen KC, Alpcan T, Başar T (2009) Stochastic games for security in networks with interdependent nodes. In: IEEE conference on game theory for networks, pp 697–703 Nguyen KC, Alpcan T, Başar T (2009) Stochastic games for security in networks with interdependent nodes. In: IEEE conference on game theory for networks, pp 697–703
50.
Zurück zum Zitat Pawlick J, Chen J, Zhu Q (2019) iSTRICT: an interdependent strategic trust mechanism for the cloud-enabled Internet of controlled things. IEEE Trans Inf Forensics Secur 14(6):1654–1669 Pawlick J, Chen J, Zhu Q (2019) iSTRICT: an interdependent strategic trust mechanism for the cloud-enabled Internet of controlled things. IEEE Trans Inf Forensics Secur 14(6):1654–1669
51.
Zurück zum Zitat Refsdal A, Solhaug B, Stølen K (2015) Cyber-risk management. Springer, Berlin Refsdal A, Solhaug B, Stølen K (2015) Cyber-risk management. Springer, Berlin
52.
Zurück zum Zitat Sannikov Y (2008) A continuous-time version of the principal-agent problem. Rev Econ Stud 75(3):957–984MathSciNetMATH Sannikov Y (2008) A continuous-time version of the principal-agent problem. Rev Econ Stud 75(3):957–984MathSciNetMATH
53.
Zurück zum Zitat Schättler H, Sung J (1993) The first-order approach to the continuous-time principal-agent problem with exponential utility. J Econ Theory 61(2):331–371MathSciNetMATH Schättler H, Sung J (1993) The first-order approach to the continuous-time principal-agent problem with exponential utility. J Econ Theory 61(2):331–371MathSciNetMATH
54.
Zurück zum Zitat Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164 Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. Comput Netw 76:146–164
55.
Zurück zum Zitat Srikant R, Başar T (1992) Asymptotic solutions to weakly coupled stochastic teams with nonclassical information. IEEE Trans Autom Control 37(2):163–173MathSciNetMATH Srikant R, Başar T (1992) Asymptotic solutions to weakly coupled stochastic teams with nonclassical information. IEEE Trans Autom Control 37(2):163–173MathSciNetMATH
56.
Zurück zum Zitat Takabi H, Joshi JB, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31 Takabi H, Joshi JB, Ahn GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8(6):24–31
57.
Zurück zum Zitat Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, CambridgeMATH Tambe M (2011) Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, CambridgeMATH
58.
Zurück zum Zitat Van Dijk M, Juels A, Oprea A, Rivest RL (2013) Flipit: the game of “stealthy takeover”. J Cryptol 26(4):655–713MathSciNetMATH Van Dijk M, Juels A, Oprea A, Rivest RL (2013) Flipit: the game of “stealthy takeover”. J Cryptol 26(4):655–713MathSciNetMATH
59.
Zurück zum Zitat Williams N (2015) A solvable continuous time dynamic principal-agent model. J Econ Theory 159:989–1015MathSciNetMATH Williams N (2015) A solvable continuous time dynamic principal-agent model. J Econ Theory 159:989–1015MathSciNetMATH
60.
Zurück zum Zitat Yong J, Zhou XY (1999) Stochastic controls: Hamiltonian systems and HJB equations, vol 43. Springer, BerlinMATH Yong J, Zhou XY (1999) Stochastic controls: Hamiltonian systems and HJB equations, vol 43. Springer, BerlinMATH
61.
Zurück zum Zitat Yüksel S, Başar T (2013) Stochastic networked control systems: stabilization and optimization under information constraints. In: Systems & control: foundations & applications series. Birkhäuser, Boston Yüksel S, Başar T (2013) Stochastic networked control systems: stabilization and optimization under information constraints. In: Systems & control: foundations & applications series. Birkhäuser, Boston
62.
Zurück zum Zitat Zhu Q, Başar T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41–46 Zhu Q, Başar T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41–46
63.
Zurück zum Zitat Zhu Q, Tembine H, Başar T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: IEEE conference on decision and control (CDC), pp 219–224 Zhu Q, Tembine H, Başar T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: IEEE conference on decision and control (CDC), pp 219–224
64.
Zurück zum Zitat Zhu Q, Yuan Z, Song JB, Han Z, Başar T (2012) Interference aware routing game for cognitive radio multi-hop networks. IEEE J Sel Areas Commun 30(10):2006–2015 Zhu Q, Yuan Z, Song JB, Han Z, Başar T (2012) Interference aware routing game for cognitive radio multi-hop networks. IEEE J Sel Areas Commun 30(10):2006–2015
Metadaten
Titel
Dynamic Contract Design for Systemic Cyber Risk Management of Interdependent Enterprise Networks
verfasst von
Juntao Chen
Quanyan Zhu
Tamer Başar
Publikationsdatum
21.07.2020
Verlag
Springer US
Erschienen in
Dynamic Games and Applications / Ausgabe 2/2021
Print ISSN: 2153-0785
Elektronische ISSN: 2153-0793
DOI
https://doi.org/10.1007/s13235-020-00363-y

Weitere Artikel der Ausgabe 2/2021

Dynamic Games and Applications 2/2021 Zur Ausgabe