Return to Article Details Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue Download Download PDF