Cyber-insurance survey

A Marotta, F Martinelli, S Nanni, A Orlando… - Computer Science …, 2017 - Elsevier
Cyber insurance is a rapidly developing area which draws more and more attention of
practitioners and researchers. Insurance, an alternative way to deal with residual risks, was …

As strong as the weakest link. Transport and supply chain security

M Jażdżewska-Gutta, P Borkowski - Transport reviews, 2022 - Taylor & Francis
The supply chains form a complicated interlinked system where any disruption, at any
possible level, can affect the network itself but also its surrounding, including the society …

Designing cyber insurance policies: The role of pre-screening and security interdependence

MM Khalili, P Naghizadeh, M Liu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber insurance is a viable method for cyber risk transfer. However, it has been shown that
depending on the features of the underlying environment, it may or may not improve the …

Dancing pigs or externalities? Measuring the rationality of security decisions

EM Redmiles, ML Mazurek, JP Dickerson - Proceedings of the 2018 …, 2018 - dl.acm.org
Accurately modeling human decision-making in security is critical to thinking about when,
why, and how to recommend that users adopt certain secure behaviors. In this work, we …

Security adoption and influence of cyber-insurance markets in heterogeneous networks

Z Yang, JCS Lui - Performance Evaluation, 2014 - Elsevier
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worm attack.
Despite the awareness of these risks and the importance of network/system security …

Interdependent security games on networks under behavioral probability weighting

AR Hota, S Sundaram - IEEE Transactions on Control of …, 2016 - ieeexplore.ieee.org
We consider a class of interdependent security games on networks where each node
chooses a personal level of security investment. The attack probability experienced by a …

Embracing and controlling risk dependency in cyber-insurance policy underwriting

MM Khalili, M Liu, S Romanosky - Journal of Cybersecurity, 2019 - academic.oup.com
This article highlights how cyber risk dependencies can be taken into consideration when
underwriting cyber-insurance policies. This is done within the context of a base rate …

Game theoretical modelling of network/cybersecurity

A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott - IEEE Access, 2019 - ieeexplore.ieee.org
Game theory is an established branch of mathematics that offers a rich set of mathematical
tools for multi-person strategic decision making that can be used to model the interactions of …

Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks

A Laszka, B Johnson, J Grossklags - … , MA, USA, December 11-14, 2013 …, 2013 - Springer
Attackers of computing resources increasingly aim to keep security compromises hidden
from defenders in order to extract more value over a longer period of time. These covert …

A game-theoretic approach to content-adaptive steganography

P Schöttle, R Böhme - … Hiding: 14th International Conference, IH 2012 …, 2013 - Springer
Content-adaptive embedding is widely believed to improve steganographic security over
uniform random embedding. However, such security claims are often based on empirical …