{"id":"https://openalex.org/W7125422311","doi":"https://doi.org/10.1007/s10207-025-01189-8","title":"Explainable AI based dynamic cybersecurity risk management for cyber insurability","display_name":"Explainable AI based dynamic cybersecurity risk management for cyber insurability","publication_year":2026,"publication_date":"2026-01-22","ids":{"openalex":"https://openalex.org/W7125422311","doi":"https://doi.org/10.1007/s10207-025-01189-8"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01189-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01189-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01189-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01189-8.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011195262","display_name":"Spyridon Papastergiou","orcid":null},"institutions":[{"id":"https://openalex.org/I150653062","display_name":"Magna International (Germany)","ror":"https://ror.org/01gk2j051","country_code":"DE","type":"company","lineage":["https://openalex.org/I150653062","https://openalex.org/I4210157170"]},{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["DE","GR"],"is_corresponding":false,"raw_author_name":"Spyridon Papastergiou","raw_affiliation_strings":["Department of Informatics, University of Piraeus, Piraeus, Greece","Research and Innovation, MAGGIOLI S.P.A., Romagna, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"Research and Innovation, MAGGIOLI S.P.A., Romagna, Italy","institution_ids":["https://openalex.org/I150653062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5099320976","display_name":"Nihala Basheer","orcid":null},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nihala Basheer","raw_affiliation_strings":["School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053994100","display_name":"Kostas I. Lampropoulos","orcid":"https://orcid.org/0000-0002-6220-0222"},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Kostas Lampropoulos","raw_affiliation_strings":["Emerging Networks & Vertical Applications, p-NET, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"Emerging Networks & Vertical Applications, p-NET, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123580915","display_name":"Panayiotis Verrios","orcid":null},"institutions":[{"id":"https://openalex.org/I174878644","display_name":"University of Patras","ror":"https://ror.org/017wvtq80","country_code":"GR","type":"education","lineage":["https://openalex.org/I174878644"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panayiotis Verrios","raw_affiliation_strings":["ACTA LTD, Patras, Greece"],"affiliations":[{"raw_affiliation_string":"ACTA LTD, Patras, Greece","institution_ids":["https://openalex.org/I174878644"]}]},{"author_position":"last","author":{"id":null,"display_name":"Shareeful Islam","orcid":null},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Shareeful Islam","raw_affiliation_strings":["School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K","institution_ids":["https://openalex.org/I51216347"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I51216347"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":134.0666,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.99874781,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"25","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6793000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.6793000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.025100000202655792,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.020400000736117363,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/insurability","display_name":"Insurability","score":0.8833000063896179},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.6668999791145325},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5335999727249146},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5307999849319458},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5067999958992004},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.47440001368522644},{"id":"https://openalex.org/keywords/risk-assessment","display_name":"Risk assessment","score":0.450300008058548},{"id":"https://openalex.org/keywords/risk-management-framework","display_name":"Risk management framework","score":0.35670000314712524}],"concepts":[{"id":"https://openalex.org/C33364599","wikidata":"https://www.wikidata.org/wiki/Q6042300","display_name":"Insurability","level":5,"score":0.8833000063896179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.753000020980835},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.6668999791145325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6097999811172485},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5536999702453613},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5335999727249146},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5307999849319458},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5067999958992004},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.47440001368522644},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.450300008058548},{"id":"https://openalex.org/C164403151","wikidata":"https://www.wikidata.org/wiki/Q7336280","display_name":"Risk management framework","level":4,"score":0.35670000314712524},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3481999933719635},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.30489999055862427},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.29260000586509705},{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.29089999198913574},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2865000069141388},{"id":"https://openalex.org/C168785665","wikidata":"https://www.wikidata.org/wiki/Q5428720","display_name":"Factor analysis of information risk","level":5,"score":0.2734000086784363},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C2780952636","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident management","level":2,"score":0.2637999951839447},{"id":"https://openalex.org/C17520342","wikidata":"https://www.wikidata.org/wiki/Q7797190","display_name":"Threat","level":5,"score":0.2558000087738037},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01189-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01189-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01189-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01189-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01189-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01189-8.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7026770710945129,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125422311.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W201055729","https://openalex.org/W2029353573","https://openalex.org/W2063236501","https://openalex.org/W2106405672","https://openalex.org/W2122163424","https://openalex.org/W2143468040","https://openalex.org/W2238461883","https://openalex.org/W2550780206","https://openalex.org/W2559923069","https://openalex.org/W2622921428","https://openalex.org/W2774393108","https://openalex.org/W2892759841","https://openalex.org/W2918490372","https://openalex.org/W3098605233","https://openalex.org/W3108935870","https://openalex.org/W3123920944","https://openalex.org/W3132331133","https://openalex.org/W3175201754","https://openalex.org/W3204707456","https://openalex.org/W3206849829","https://openalex.org/W4213292645","https://openalex.org/W4309689565","https://openalex.org/W4319430863","https://openalex.org/W4320921204","https://openalex.org/W4328028680","https://openalex.org/W4362496862","https://openalex.org/W4377142609","https://openalex.org/W4381802193","https://openalex.org/W4383223729","https://openalex.org/W4383619745","https://openalex.org/W4386556345","https://openalex.org/W4387178135","https://openalex.org/W4387341418","https://openalex.org/W4387963615","https://openalex.org/W4388323213","https://openalex.org/W4390947214","https://openalex.org/W4391685200","https://openalex.org/W4391769816","https://openalex.org/W4391811326","https://openalex.org/W4392741075","https://openalex.org/W4394503499","https://openalex.org/W4401719704","https://openalex.org/W4403502839","https://openalex.org/W4403684398","https://openalex.org/W4403852093","https://openalex.org/W4404845651","https://openalex.org/W4404886489","https://openalex.org/W4408912041","https://openalex.org/W4409291016","https://openalex.org/W4412176299"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Cybersecurity":[1],"risk":[2,26,62,66,86,107,129],"is":[3,28,31,81],"one":[4],"of":[5,16,19,42,160,185,206],"the":[6,35,60,75,144,158,161,182,186,196,204,211,217],"primary":[7],"and":[8,14,22,37,44,47,132,140,155,178,200,210],"growing":[9],"concerns":[10],"for":[11,77,110,126,195],"ensuing":[12],"security":[13,50,54,208],"resilience":[15],"organizations,":[17],"regardless":[18],"their":[20],"size":[21],"type.":[23],"While":[24],"proactive":[25],"management":[27,108],"effective,":[29],"it":[30],"challenging":[32],"due":[33],"to":[34,58,65,89,142,173],"evolving":[36],"sophisticated":[38],"threat":[39],"landscape,":[40],"exploitation":[41],"known":[43],"unknown":[45],"vulnerabilities,":[46],"a":[48,168],"dynamic":[49,53,105],"context.":[51],"The":[52,116,164,190],"context":[55],"further":[56],"complicates":[57],"calculate":[59],"accurate":[61],"level,":[63],"leading":[64],"perception":[67],"that":[68],"can":[69],"vary":[70],"between":[71],"different":[72],"stakeholders.":[73],"However,":[74],"demand":[76],"adopting":[78],"cyber":[79,112,212],"insurance":[80],"increasing":[82],"as":[83,137],"an":[84,100,119,151],"effective":[85],"mitigation":[87],"strategy":[88],"avoid":[90],"any":[91],"potential":[92],"loss.":[93],"In":[94],"this":[95,97],"context,":[96],"paper":[98],"proposes":[99],"Explainable":[101],"AI":[102],"(XAI)":[103],"based":[104,124,215],"cybersecurity":[106],"approach":[109,117],"informed":[111],"insurability":[113,213],"decision":[114,145,214],"making.":[115,146],"utilizes":[118],"Large":[120],"Language":[121],"Model":[122],"(LLM)":[123],"framework":[125],"real-time,":[127],"contextualized":[128],"level":[130],"assessment":[131],"adopts":[133],"XAI":[134,201],"techniques":[135],"such":[136],"feature":[138],"contribution":[139],"correlation,":[141],"justify":[143],"A":[147],"comprehensive":[148],"evaluation":[149],"using":[150],"industrial":[152],"use":[153,187],"case":[154,188],"experiment":[156,165],"demonstrates":[157],"applicability":[159],"proposed":[162],"approach.":[163],"part":[166],"uses":[167],"widely":[169],"used":[170],"vulnerability":[171,198],"dataset":[172],"predicate":[174],"high":[175],"exploitable":[176,197],"vulnerabilities":[177],"links":[179],"them":[180],"with":[181],"identified":[183],"assets":[184],"scenario.":[189],"result":[191],"shows":[192],"96.9%":[193],"accuracy":[194],"identification":[199],"operationalisation":[202],"justifies":[203],"selection":[205],"right":[207],"control":[209],"on":[216],"residual":[218],"risk.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2026-01-23T00:00:00"}
