M Jażdżewska-Gutta, P Borkowski - Transport reviews, 2022 - Taylor & Francis
The supply chains form a complicated interlinked system where any disruption, at any possible level, can affect the network itself but also its surrounding, including the society …
Cyber insurance is a viable method for cyber risk transfer. However, it has been shown that depending on the features of the underlying environment, it may or may not improve the …
Accurately modeling human decision-making in security is critical to thinking about when, why, and how to recommend that users adopt certain secure behaviors. In this work, we …
Z Yang, JCS Lui - Performance Evaluation, 2014 - Elsevier
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worm attack. Despite the awareness of these risks and the importance of network/system security …
AR Hota, S Sundaram - IEEE Transactions on Control of …, 2016 - ieeexplore.ieee.org
We consider a class of interdependent security games on networks where each node chooses a personal level of security investment. The attack probability experienced by a …
This article highlights how cyber risk dependencies can be taken into consideration when underwriting cyber-insurance policies. This is done within the context of a base rate …
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for multi-person strategic decision making that can be used to model the interactions of …
Attackers of computing resources increasingly aim to keep security compromises hidden from defenders in order to extract more value over a longer period of time. These covert …
P Schöttle, R Böhme - … Hiding: 14th International Conference, IH 2012 …, 2013 - Springer
Content-adaptive embedding is widely believed to improve steganographic security over uniform random embedding. However, such security claims are often based on empirical …