THE VULNERABILITY OF PRICE STABILIZATION SCHEMES TO SPECULATIVE ATTACK

被引:57
|
作者
SALANT, SW
机构
关键词
D O I
10.1086/261127
中图分类号
F [经济];
学科分类号
02 ;
摘要
引用
收藏
页码:1 / 38
页数:38
相关论文
共 50 条
  • [41] Assessing biological attack vulnerability
    Thilmany, J
    MECHANICAL ENGINEERING, 2002, 124 (02) : 16 - +
  • [42] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [43] Sybil attack vulnerability trilemma
    Platt, Moritz
    Platt, Daniel
    McBurney, Peter
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2024, 39 (04) : 446 - 460
  • [44] Attack vulnerability of complex networks
    Holme, P
    Kim, BJ
    Yoon, CN
    Han, SK
    PHYSICAL REVIEW E, 2002, 65 (05)
  • [45] Skiplist Timing Attack Vulnerability
    Nussbaum, Eyal
    Segal, Michael
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 49 - 58
  • [46] Attack vulnerability of complex networks
    Holme, Petter
    Kim, Beom Jun
    Yoon, Chang No
    Han, Seung Kee
    Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 2002, 65 (05): : 1 - 056109
  • [47] AGGRESSION AS A FUNCTION OF VULNERABILITY TO ATTACK
    MERRICK, R
    TAYLOR, SP
    PSYCHONOMIC SCIENCE, 1970, 20 (04): : 203 - 204
  • [48] Second moments in speculative attack models: panel evidence
    Galindo, AJ
    Maloney, WF
    JOURNAL OF INTERNATIONAL ECONOMICS, 2002, 56 (01) : 97 - 129
  • [49] The financing role of banking system in the speculative currency attack
    Chu Jingyuan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INNOVATION & MANAGEMENT, VOLS I AND II, 2007, : 1046 - 1051
  • [50] Attack Vulnerability of Network Controllability
    Lu, Zhe-Ming
    Li, Xin-Feng
    PLOS ONE, 2016, 11 (09):