Timing of cyber conflict

Robert Axelrod,Rumen Iliev
DOI: https://doi.org/10.1073/pnas.1322638111
IF: 11.1
2014-01-13
Proceedings of the National Academy of Sciences
Abstract:Significance The world’s economy and international security have come to depend upon a secure Internet. International rivalries and conflicts have already provided challenges to Internet security in the form of espionage, sabotage, and denial of service. New vulnerabilities in computer systems are constantly being discovered. When an individual, group, or nation has access to means of exploiting such vulnerabilities in a rival’s computer systems, it faces a decision of whether to exploit its capacity immediately or wait for a more propitious time. This paper introduces a simple mathematical model applied to four case studies to promote the understanding of the new domain of cyber conflict.
What problem does this paper attempt to address?