Blar i UiS Brage på emneord "game theory"
Viser treff 1-20 av 23
-
A strategic analysis of information sharing among cyber hackers
(Journal article; Peer reviewed, 2015-08)We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants ... -
Active vs. passive defense against a strategic attacker
(Journal article; Peer reviewed, 2011)The article analyzes how a defender determines a balance between protecting an object (passive defense) and striking preventively against an attacker seeking to destroy the object (active defense). The attacker analogously ... -
Additive Multi-Effort Contests
(Peer reviewed; Journal article, 2020-03)Impact on rent seeking occurs even when a player exerts only one effort. This contrasts with models of multiplicative efforts with impact on rent seeking only when a player exerts all its available efforts. An analytical ... -
Assessing Stochastic and Intelligent Threats in the Norwegian Petroleum Industry, Current Approach(s) and Enhancement with Game Theory influenced Risk Assessment Approach (GIRA)
(Masteroppgave/UIS-TN-IØRP/2016;, Master thesis, 2016-06-14)In the Norwegian petroleum industry quantitative risk assessments QRA’s are carried out to assess risk as well as for accounting for uncertainties given the strength of background knowledge available to the assessors. The ... -
Choosing what to protect when attacker resources and asset valuations are uncertain
(Journal article; Peer reviewed, 2014-07)The situation has been modelled where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets ... -
Cooperation and between-group competition
(Journal article; Peer reviewed, 2000-07)Introducing competition between groups may induce cooperation to emerge in defection games despite considerable cost of cooperation. If the groups can confine themselves to a cooperative sector, either by providing incentives ... -
A Game Between Central Banks and Households Involving Central Bank Digital Currencies, Other Digital Currencies and Negative Interest Rates
(Peer reviewed; Journal article, 2022-09-08)Central Bank Digital Currencies (CBDCs) enable negative interest rates. A game is analyzed between a central bank (accounting for the government’s interest) and a representative household choosing to consume, hold CBDC, ... -
Game Theoretic Analysis of Persons, the Pharmaceutical Industry, and Donors in Disease Contraction and Recovery
(Peer reviewed; Journal article, 2020)Disease contraction and recovery depend on complex interaction between persons potentially contracting and recovering from the disease, the pharmaceutical industry potentially developing drugs, and donors potentially ... -
Game theoretic analysis of two-period-dependent degraded multistate reliability systems
(Journal article; Peer reviewed, 2011)A system of two components is analyzed as a two-period game. After period 1 the system can be fully operational, in two states of intermediate degradation, or fail. Analogously to changing failure rates in dependent systems ... -
Governmental Taxation of Households Choosing Between a National Currency and a Cryptocurrency
(Peer reviewed; Journal article, 2021-04)A game between a representative household and a government was analyzed. The household chose which fractions of two currencies to hold, e.g., a national currency such as a Central Bank Digital Currency (CBDC) and a global ... -
Governments' and terrorists' defense and attack in a T-period game
(Journal article; Peer reviewed, 2011-01)We analyze how a government allocates its resources between attacking to downgrade a terrorist’s resources and defending against a terrorist attack. Analogously, the terrorist allocates its resources between attacking a ... -
Migration and intergroup conflict
(Journal article; Peer reviewed, 2000-12)Two groups in conflict produce and appropriate internally generated consumable output in a two-stage game assuming equal within-group sharing and endogenous group sizes. It is shown how agents leave groups with high ... -
Policy Makers, the International Community and the Population in the Prevention and Treatment of Diseases: Case Study on HIV/AIDS
(Journal article; Peer reviewed, 2017-01)A four-period game is developed between a policy maker, the international community, and the population. This research supplements, through implementing strategic interaction, earlier research analyzing "one player at a ... -
Protection vs. separation in parallel non-homogeneous systems
(Journal article; Peer reviewed, 2009)The article considers strategic defense and attack of a system consisting of N functionally identical parallel elements of n types distinguished by element’s performance. The elements can be separated in order to reduce ... -
Reputation, incomplete information, and differences in patience in repeated games with multiple equilibria
(Journal article; Peer reviewed, 2007)A game with multiple equilibria and incomplete information, which allows for reputation building, is repeated infinitely many times. Increasing differences in patience contribute to a greater likelihood of cooperation. As ... -
Risk limits, conflict, and equilibrium selection in games with multiple equilibria
(Journal article; Peer reviewed, 2009)A risk limit conflict measure is developed as the product of the two players’ maximum probabilities of being recalcitrant when pursuing a preferred equilibrium. Although the justification for it is different, the measure ... -
Salmon Aquaculture in a Global Perspective, a Lesson from Norwegian Regulations
(Masteroppgave/UIS-TN-IØRP/2016;, Master thesis, 2016-12-15)The salmon aquaculture is experiencing rapid growth as the worlds need for sustainable sources of protein and fat increases. The Norwegian aquaculture industry is world leading. Over the years several regulatory schemes ... -
Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers
(Journal article; Peer reviewed, 2017-05)A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and ... -
The Shapley Value of Coalitions to Other Coalitions
(Peer reviewed; Journal article, 2020-09)The Shapley value for an n-person game is decomposed into a 2n × 2n value matrix giving the value of every coalition to every other coalition. The cell ϕIJ(v, N) in the symmetric matrix is positive, zero, or negative, ... -
Shield versus sword resource distribution in K-round duels
(Journal article; Peer reviewed, 2010-06)The paper considers optimal resource distribution between offense and defense in a duel. In each round of the duel two actors exchange attacks distributing the offense resources equally across K rounds. The offense ...