Showing 121 - 130 of 73,770
study of targeted defense. What are the “key” nodes to defend to maximize functionality of the network? What are the … collective welfare? We first provide a characterization of optimal attack and defense in terms of two classical concepts in graph … resources spent on attack and defense) and helps us identify a new class of networks-windmill graphs-that minimize conflict. We …
Persistent link: https://www.econbiz.de/10011704841
Persistent link: https://www.econbiz.de/10011705072
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10012432466
US military Research and Development (R&D) expenditures arguably represent the best example of mission-oriented policy …. They are sizeable, with a clear-cut public purpose (national defense) and with the government being their exclusive … investigate the impact of defense R&D on privately-financed R&D. To address potential endogeneity in the allocation of funds, we …
Persistent link: https://www.econbiz.de/10012319172
Persistent link: https://www.econbiz.de/10011823872
The defense industry in the United Kingdom has experienced significant structural change since the end of the Cold War … such change might be related to innovation. Firms’ own-financed R&D in British defense industry is proposed as a useful …-revived inverted-U hypothesis linking competition to innovation, and in government demand fluctuations and British defense procurement …
Persistent link: https://www.econbiz.de/10010941244
difficulties in trying to define corruption in both general terms and within the context of the defense and security sector. It …
Persistent link: https://www.econbiz.de/10010941288
Persistent link: https://www.econbiz.de/10011020843
Persistent link: https://www.econbiz.de/10011020844
We examine the optimal disruption of dark (covert and illegal) networks. Of central importance is that an interventionist will generally have incomplete information about the dark network's architecture. We derive the optimal disruption strategy in a stylized model of dark network intervention...
Persistent link: https://www.econbiz.de/10010959990