Author:
Mavronicolas Marios,Monien Burkhard,Lesta Vicky Papadopoulou
Subject
Applied Mathematics,Discrete Mathematics and Combinatorics
Reference28 articles.
1. R. Anderson, Why information security is hard—an economic perspective, in: Proceedings of the 17th Annual Computer Security Applications Conference, December 2001, pp. 358–365.
2. The price of stability for network design with fair cost allocation;Anshelevich;SIAM Journal on Computing,2008
3. König–Egerváry graphs, 2-bicritical graphs and fractional matchings;Bourjolly;Discrete Applied Mathematics,1989
4. N. Christin, J. Grossklags, J. Chuang, Near rationality and competitive equilibria in networked systems, in: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, August 2004, pp. 213–219.
5. Paths, trees and flowers;Edmonds;Canadian Journal of Mathematics,1965
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Price of Defense;Algorithmica;2021-01-04
2. A Study of Security Requirements Negotiation;2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing;2014-08
3. A Game-Theoretic Analysis of Security Investment for Service Computing Applications;2014 IEEE World Congress on Services;2014-06