Academia.eduAcademia.edu

Game Theoretic Models

description20 papers
group16 followers
lightbulbAbout this topic
Game theoretic models are mathematical frameworks used to analyze strategic interactions among rational decision-makers. These models explore how individuals or groups make choices that affect one another's outcomes, focusing on concepts such as equilibrium, strategies, and payoffs to predict behavior in competitive and cooperative scenarios.
lightbulbAbout this topic
Game theoretic models are mathematical frameworks used to analyze strategic interactions among rational decision-makers. These models explore how individuals or groups make choices that affect one another's outcomes, focusing on concepts such as equilibrium, strategies, and payoffs to predict behavior in competitive and cooperative scenarios.

Key research themes

1. How can compositional approaches enable scalable modeling and design of complex economic and institutional games?

This research theme focuses on developing compositional game theory frameworks that allow the construction and analysis of large-scale and complex games by building them from smaller game components. It addresses the scalability challenge arising from the exponential growth of strategies and interaction complexity in classical monolithic game models, aiming at faithful representations of real-world institutions and economic systems with modularity and abstraction. The compositional approach leverages category theory, enabling formal composition operators and graphical representations, improving expressiveness, design, and computational tractability in economic and institutional game modeling.

Key finding: Introduces the concept of open games as morphisms in a symmetric monoidal category, enabling the compositional construction of games by sequential and parallel composition. This framework preserves Nash equilibria and best... Read more
Key finding: Expands on compositional game theory to design large-scale institutional games by integrating category theory concepts into economic and behavioral modeling. It enables abstraction, modularity, and formal visual languages... Read more

2. What are the challenges and advancements in modeling games with uncertain and complex payoff structures beyond real-valued utilities?

This research area investigates game theoretic models where payoffs are not crisp numerical values but probability distributions or more complex objects to capture inherent uncertainty and multiple criteria in payoffs, particularly motivated by security risk management and real-world scenarios with imprecise or stochastic consequences. These models confront challenges such as the absence of equilibria under classical assumptions, convergence failures, and the need for novel equilibrium definitions and refinements that faithfully represent uncertain outcomes and risk preferences.

Key finding: Develops a theory of strategic games where payoffs are probability distributions rather than fixed real numbers. The paper identifies fundamental issues such as existence and computation of equilibria in this setting, reveals... Read more

3. How does game theory integrate with industrial organization to analyze firm behavior, market structure, and regulatory policies?

This theme examines the application of game theoretic tools to key topics in industrial organization, including oligopoly models, dynamic competition, pricing under consumer search, mergers and collusion, contests, and special areas such as intellectual property and corruption. The focus is on methodologically rigorous frameworks that address both theoretical and empirical challenges, bridging the gap between game theory and economic policy evaluation and firm strategy analysis.

Key finding: Provides an overview synthesizing how game theory underpins modern industrial organization models, highlighting basic games, dynamic games, information asymmetry, collusion, mergers, and special topics. Emphasizes game... Read more
Key finding: Surveys applications of game theoretical models to collusion, mergers, contests, auctions, and regulatory topics, with detailed treatment of leniency policies, coordinated effects in mergers, and endogenous timing in... Read more
Key finding: Elaborates foundational theoretical frameworks for studying strategic firm behavior, including collusion in vertically differentiated markets, cartel stability conditions, mergers' welfare effects, and experimental industrial... Read more
Key finding: Explores the epistemic foundations of non-cooperative games, focusing on strategic-form games, rationality assumptions, and common knowledge frameworks. Clarifies the mathematical structure underpinning strategic interactions... Read more
Key finding: Provides a broad categorization of game types relevant to economics, including normal form, extensive form, zero-sum and non-zero-sum games, and explains how equilibrium concepts such as Nash equilibria relate to firm... Read more

All papers in Game Theoretic Models

Today, cyber deception is an essential element of proactive and reactive defense systems. Military equipment is increasingly connected to the Internet, and next-generation network security is becoming increasingly complex. This vast... more
Today, cyber deception is an essential element of proactive and reactive defense systems. Military equipment is increasingly connected to the Internet, and next-generation network security is becoming increasingly complex. This vast... more
In many Internet of Thing (IoT) application domains security is a critical requirement, because malicious parties can undermine the effectiveness of IoT-based systems by compromising single components and/or communication channels. Thus,... more
A "noisy-rich" (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabilities until he or she successfully compromises the targeted network. We develop an adversarial foundation, based on Stackelberg games, for... more
• Two treatments (anonymous conditions)-Static network (played prisoner's dilemma only)-Dynamic network (prisoner's dilemma followed by a link-breaking stage) • 10 groups per treatment of 10 individuals (♀=55, ♂=45) • Starting network... more
Adoption of dispersed renewable energy technologies requires transmission network expansion. Besides the transmission system operator (TSO), restructuring of electricity industries has introduced a merchant investor (MI), who earns... more
Wireless Sensor Networks typically consist of a large number of sensor nodes with constrained resources. Cluster-based routing algorithms for WSNs try to preserve battery power by grouping nodes into multiple clusters: a single node in... more
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive... more
This paper proposes a game theoretic methodology for analysis and design of survivable and secure systems and protocols. Modern game theory provides a natural setup for dealing with adversarial situations, which may involve multiple... more
Over the last two decades, the electricity industry has shifted from regulation of monopolistic and centralized utilities towards deregulation and promoted competition. With increased competition in electric power markets, system... more
Over the last two decades, the electricity industry has shifted from regulation of monopolistic and centralized utilities towards deregulation and promoted competition. With increased competition in electric power markets, system... more
An oligopoly with spatially dispersed generators and consumers and with multi-period demand is modeled in this paper. The producers are assumed to behave in a Cournot manner with regulated transmission prices. A (generalized) Nash... more
The Internet, with the rise of the IoT, is one of the most powerful means of propagating a terrorist threat, and at the same time the perfect environment for deploying ubiquitous online surveillance systems.This paper tackles the problem... more
Defensive deception is a promising approach for cyber defense. Via defensive deception, the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real resources. Although defensive deception is increasingly... more
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players... more
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a... more
In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing... more
We present a structural framework to describe games in terms of components. The components are divided into four major areas: meta-structure, bounding, narrative and objective. The framework is developed to be used in conjunction with... more
Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse... more
Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, rms investing in cyber-security for their information technology infrastructure need to consider attack-detection... more
Internet of Things (IoT) devices and applications can have significant vulnerabilities, which may be exploited by adversaries to cause considerable harm. An important approach for mitigating this threat is remote attestation, which... more
Wireless Sensor Networks (WSNs) are made up of small low-power nodes that are used in different areas like environment monitoring and several military and civilian applications. But due to its small size and limited energy source, energy... more
Security systems for email spam filtering, network intrusion detection, steganalysis, and watermarking, frequently use classifiers to separate malicious behavior from legitimate. Typically, they use a fixed operating point minimizing the... more
Before executing an attack, adversaries usually explore the victim's network in an attempt to infer the network topology and identify vulnerabilities in the victim's servers and personal computers. Falsifying the information collected by... more
Rink hockey like any other team sport game is necessary to have a mastery of the game object "the ball" and for this it is necessary that athletes do not have a deficient training steps in that process, because it is during... more
In this paper we present a novel Stackelberg-type model of security domains: Security Assets aSsignment with Information disclosure (SASI). The model combines both the features of the Stackelberg Security Games (SSGs) model and of the... more
Abstract— Because of the stochastic nature of traffic requirement matrix, it's very difficult to get the optimal traffic distribution to minimize the delay even with adaptive routing protocol in a fixed connection network where... more
A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabilities until he or she successfully compromises the targeted network. We develop an adversarial foundation, based on Stackelberg games, for... more
Most past work on honeypots has made two assumptions: (i) they assume that the only defensive measure used is a honeypot mechanism, and (ii) they do not consider both rational and subrational adversaries and do not reason with an... more
Abstract: Clustering real world data often faced with curse of dimensionality, where real world data often consist of many dimensions. Multidimensional data clustering evaluation can be done through a density-based approach. Density... more
This paper lays the foundation for constructing a comprehensive analytical tool for selection of managers on the basis of core leadership capabilities. A game theoretic model, where the key coefficient of the input vector was inferred... more
Game Theory (GT) has been used with outstanding outcomes to formulate, and either design or optimize, the operation of a huge number of representative communications and networking scenarios, each one with distinct entities aiming at... more
Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse... more
We study the problem of optimal resource allocation for packet selection and inspection to detect potential threats in large computer networks with multiple computers of differing importance. An attacker tries to harm these targets by... more
We study the problem of optimal resource allocation for packet selection and inspection to detect potential threats in large computer networks with multiple computers of differing importance. An attacker tries to harm these targets by... more
Kutlu (2009, “Price discrimination in Stackelberg competition”, Journal of Industrial Economics) shows that the Stackelberg leader sells to the highest value consumers and only the Stackelberg follower practises price discrimination. We... more
Partially owing to the political deadlock in Washington DC, US climate policy, historically, has been driven mainly by state or regional effort, such as the Regional Greenhouse Gas Initiative in the northeast United States and California... more
We formulate a dynamic facility location model for a …rm locating on a discrete network. It is assumed that this locating …rm will act as the leader …rm in an industry characterized by Stackelberg leader-follower competition. The …rm's I... more
1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting... more
A Wireless Sensor Network (WSN) is a network of a small, lightweight, portable sensor nodes, which can sense features within its proximity e.g. temperature. A sensor node possesses limited power resources. Clustering is one of the several... more
1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting... more
1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting... more
In wireless sensor networks, energy conservation is one of the main issues since sensor nodes have limited energy source. Clustering came as an effort to reduce the energy consumption of sensor nodes. Besides energy conservation, the... more
To elucidate the mechanisms for the evolution of cooperation has been a core problem in biology, economics and sociology. Evolutionary game theory has proven to be an efficient approach to investigate the problem by using models based on... more
We present a comprehensive robust decision support framework with novel computational algorithms for decision makers in a non-cooperative sequential setup. Existing simulation based approaches such as Monte Carlo methods can be... more
This paper lays the foundation for constructing a comprehensive analytical tool for selection of managers on the basis of core leadership capabilities. A game-theoretic model, where the key coefficient of the input vector was inferred... more
— We investigate the use of pricing mechanisms as a means to achieve a desired feedback control strategy among selfish agents. We study a hierarchical linear-quadratic game with many dynamically coupled Nash followers and an uncoupled... more
Wireless sensor networks, are always in danger of extinction, due to limits on the amount of energy (battery) their nodes, high consumption Energy in addition to the lack of interchangeability of batteries. When communicating network... more
Download research papers for free!