16
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Corruption and botnet defense: a mean field game approach

      Preprint

      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Recently developed toy models for the mean-field games of corruption and botnet defence in cyber-security with three or four states of agents are extended to a more general mean-field-game model with \(2d\) states, \(d\in \N\). In order to tackle new technical difficulties arising from a larger state-space we introduce new asymptotic regimes, namely small discount and small interaction asymptotics. Moreover, the link between stationary and time-dependent solutions is established rigorously leading to a performance of the turnpike theory in a mean-field-game setting.

          Related collections

          Most cited references 14

          • Record: found
          • Abstract: not found
          • Article: not found

          Jeux à champ moyen. I – Le cas stationnaire

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Large population stochastic dynamic games: closed-loop McKean-Vlasov systems and the Nash certainty equivalence principle

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Corruption: A Review

               Arvind Jain (2001)
                Bookmark

                Author and article information

                Journal
                2016-07-25
                Article
                1607.07350

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                Custom metadata
                91A06
                math.OC

                Numerical methods

                Comments

                Comment on this article