Decision and Game Theory for Security by Unknown

Decision and Game Theory for Security by Unknown

Author:Unknown
Language: eng
Format: epub, pdf
ISBN: 9783030324308
Publisher: Springer International Publishing


Here, if HA or MA deviate and play and DM chooses A, HA will receive a payoff of if it plays and will receive a payoff of if it plays . On the other hand, MA will receive a payoff of if it plays and will receive a payoff of if it plays . Thus, in this case, there will be a pooling equilibrium if and only if:

Here, if HA or MA deviate and play and DM chooses B, HA will receive a payoff compared to if it plays , while MA will receive a payoff of compared to if it plays . Thus, in this particular case, HA and MA do not have any incentive to deviate as well. In summary, an equilibrium on APP’s pooling strategy of () also exists when .

As the proof of a pooling equilibrium on the APP strategy of follows an analogous methodology, it is omitted to conserve space. In summary, equilibrium on the APP’s pooling strategy of () exists when , or when . For complete proofs, please refer to [9].



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.