Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

A survey of interdependent information security games

A Laszka, M Felegyhazi, L Buttyan - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …

Information security breaches and IT security investments: Impacts on competitors

CY Jeong, SYT Lee, JH Lim - Information & Management, 2019 - Elsevier
In current business climate, a firm's information systems security is no longer independent
from the industry's broader security environment. A question arises, then, whether stock …

Sok: Tools for game theoretic models of security for cryptocurrencies

S Azouvi, A Hicks - 2021 - cryptoeconomicsystems.pubpub.org
Cryptocurrencies have garnered much attention in recent years, both from the academic
community and industry. One interesting aspect of cryptocurrencies is their explicit …

Prices of anarchy, information, and cooperation in differential games

T Başar, Q Zhu - Dynamic Games and Applications, 2011 - Springer
The price of anarchy (PoA) has been widely used in static games to quantify the loss of
efficiency due to noncooperation. Here, we extend this concept to a general differential …

Uncertainty in interdependent security games

B Johnson, J Grossklags, N Christin… - International conference on …, 2010 - Springer
Even the most well-motivated models of information security have application limitations due
to the inherent uncertainties involving risk. This paper exemplifies a formal mechanism for …

On non-cooperative genomic privacy

M Humbert, E Ayday, JP Hubaux, A Telenti - Financial Cryptography and …, 2015 - Springer
Over the last few years, the vast progress in genome sequencing has highly increased the
availability of genomic data. Today, individuals can obtain their digital genomic sequences …

Tracking games in mobile networks

M Humbert, MH Manshaei, J Freudiger… - Decision and Game …, 2010 - Springer
Users of mobile networks can change their identifiers in regions called mix zones in order to
defeat the attempt of third parties to track their location. Mix zones must be deployed …

Are security experts useful? Bayesian Nash equilibria for network security games with limited information

B Johnson, J Grossklags, N Christin… - … Security–ESORICS 2010 …, 2010 - Springer
A common assumption in security research is that more individual expertise unambiguously
leads to a more secure overall network. We present a game-theoretic model in which this …

[PDF][PDF] A survey of interdependent security games

A Laszka, M Felegyhazi, L Buttyán - CrySyS, 2012 - Citeseer
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …