Z Yang, JCS Lui - Performance Evaluation, 2014 - Elsevier
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worm attack. Despite the awareness of these risks and the importance of network/system security …
This article highlights how cyber risk dependencies can be taken into consideration when underwriting cyber-insurance policies. This is done within the context of a base rate …
M Lelarge - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of …
S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of business or consumer data, which is often triggered by multi-stage attacks and advanced …
Over the last few years, both the development of ransomware strains as well as changes in the marketplace for malware have greatly reduced the entry barrier for attackers to conduct …
Recently, the development of ransomware strains and changes in the marketplace for malware have greatly reduced the entry barrier for attackers to conduct large-scale …
We study the problem of designing cyber insurance policies in an interdependent network, where the loss of one agent (a primary party) depends not only on his own effort, but also on …
Cyber insurance is a method for risk transfer but may or may not improve the state of network security. In this work, we consider a profit-maximizing insurer with voluntarily participating …
H Chan, M Ceyko, LE Ortiz - arXiv preprint arXiv:1210.4838, 2012 - arxiv.org
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study aspects of the interdependence of risk and security in multi-agent …