Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations
暂无分享,去创建一个
Sotiris Ioannidis | Dimitrios G. Katehakis | Christos Kloukinas | George Hatzivasilis | Artsiom Yautsiukhin | Nikos Petroulakis | Marios Panayiotou | Panos Chatziadam | Matteo Mangini | Michalis Antoniou
[1] Therese Jones,et al. Content analysis of cyber insurance policies: how do carriers price cyber risk? , 2019, J. Cybersecur..
[2] Fabio Martinelli,et al. Cyber-insurance survey , 2017, Comput. Sci. Rev..
[3] Leandros Tassiulas,et al. Economics of mobile data offloading , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[4] Ioannis Papaefstathiou,et al. AmbISPDM - Managing embedded systems in ambient environments and disaster mitigation planning , 2018, Applied intelligence (Boston).
[5] Erik T. Mueller,et al. Commonsense Reasoning: An Event Calculus Based Approach , 2006 .
[6] Ioannis Papaefstathiou,et al. Real-time management of railway CPS secure administration of IoT and CPS infrastructure , 2017, 2017 6th Mediterranean Conference on Embedded Computing (MECO).
[7] Fabio Roli,et al. 2020 Cybercrime Economic Costs: No Measure No Solution , 2015, 2015 10th International Conference on Availability, Reliability and Security.
[8] Sotiris Ioannidis,et al. Review of Security and Privacy for the Internet of Medical Things (IoMT) , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[9] Sotiris Ioannidis,et al. The CE-IoT Framework for Green ICT Organizations: The interplay of CE-IoT as an enabler for green innovation and e-waste management in ICT , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[10] Martin Eling,et al. Cyber Risk: Too Big to Insure? Risk Transfer Options for a Mercurial Risk Class , 2016 .
[11] Rahul Telang,et al. Economics of software vulnerability disclosure , 2005, IEEE Security & Privacy.
[12] George Spanoudakis,et al. Monitoring-Based Certification of Cloud Service Security , 2015, OTM Conferences.
[13] Inger Anne Tøndel,et al. Mitigating Risk with Cyberinsurance , 2015, IEEE Security & Privacy.
[14] Daniel W. Woods,et al. Policy Measures and Cyber Insurance: A Framework , 2017 .
[15] George Spanoudakis,et al. Cloud Certification Process Validation Using Formal Methods , 2017, ICSOC.
[16] Per Håkon Meland,et al. When to Treat Security Risks with Cyber Insurance , 2018, 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[17] Fabio Martinelli,et al. Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market , 2017, CRiSIS.
[18] Tridib Bandyopadhyay,et al. Why IT managers don't go for cyber-insurance products , 2009, Commun. ACM.