A system to calculate Cyber Value-at-Risk
暂无分享,去创建一个
Sadie Creese | Michael Goldsmith | Jason R. C. Nurse | Ioannis Agrafiotis | Arnau Erola | Louise Axon | Jason R.C. Nurse | S. Creese | M. Goldsmith | Arnau Erola | Ioannis Agrafiotis | Louise Axon
[1] Michael E. Kuhl,et al. Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach , 2018 .
[2] D. Hendricks,et al. Evaluation of Value-at-Risk Models Using Historical Data , 1996 .
[3] Keyun Ruan,et al. Introducing cybernomics: A unifying economic framework for measuring cyber risk , 2017, Comput. Secur..
[4] F. O. Hoffman,et al. Propagation of uncertainty in risk assessments: the need to distinguish between uncertainty due to lack of knowledge and uncertainty due to variability. , 1994, Risk analysis : an official publication of the Society for Risk Analysis.
[5] Benjamin Edwards,et al. Hype and Heavy Tails: A Closer Look at Data Breaches , 2016, WEIS.
[6] Peter F. Christoffersen,et al. Does Realized Skewness Predict the Cross-Section of Equity Returns? , 2015 .
[7] Rabih Bashroush,et al. Corporate Information Security Investment Decisions: A Qualitative Data Analysis Approach , 2018, Int. J. Enterp. Inf. Syst..
[8] Lawrence A. Gordon,et al. A framework for using insurance for cyber-risk management , 2003, Commun. ACM.
[9] Daniel W. Woods. Systematization of Knowledge: Quantifying Cyber Risk , 2020 .
[10] Kevin Jones,et al. A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..
[11] Dean Fantazzini,et al. The effects of misspecified marginals and copulas on computing the value at risk: A Monte Carlo study , 2009, Comput. Stat. Data Anal..
[12] Neil D. Pearson,et al. Value at Risk , 2000 .
[13] D. Duffie,et al. An Overview of Value at Risk , 1997 .
[14] Sadie Creese,et al. Analysing cyber-insurance claims to design harm-propagation trees , 2019, 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[15] Richard D. F. Harris,et al. Forecasting value at risk allowing for time variation in the variance and kurtosis of portfolio returns , 2002 .
[16] R. Rockafellar,et al. Optimization of conditional value-at risk , 2000 .
[17] Ulrik Franke,et al. Enterprise IT service downtime cost and risk transfer in a supply chain , 2020, Operations Management Research.
[18] Konstantinos Psounis,et al. Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets , 2016, IEEE Transactions on Dependable and Secure Computing.
[19] Daniel W. Woods,et al. The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices , 2019 .
[20] J. David Cabedo,et al. Estimating oil price ‘Value at Risk’ using the historical simulation approach , 2003 .
[21] A. Azzalini,et al. The multivariate skew-normal distribution , 1996 .
[22] Olivier Lopez,et al. Cyber claim analysis using Generalized Pareto regression trees with applications to insurance , 2021 .
[23] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[24] Martin Eling,et al. What are the actual costs of cyber risk events? , 2019, Eur. J. Oper. Res..
[25] Ulrik Franke,et al. The Distribution of Time to Recovery of Enterprise IT Services , 2014, IEEE Transactions on Reliability.
[26] Alan G. White,et al. Value at Risk When Daily Changes in Market Variables are not Normally Distributed , 1998 .
[27] Sadie Creese,et al. The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes , 2020, 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
[28] F. Martinelli,et al. Cyber Risk Management: An Actuarial Point of View , 2019 .
[29] Norman Fenton,et al. A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model , 2020, Comput. Secur..
[30] Sadie Creese,et al. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate , 2018, J. Cybersecur..
[31] Markus Riek,et al. A Fundamental Approach to Cyber Risk Analysis , 2018 .
[32] Fabio Massacci,et al. Optimisation of cyber insurance coverage with selection of cost effective security controls , 2021, Comput. Secur..