{"id":"https://openalex.org/W4413679296","doi":"https://doi.org/10.1109/csr64739.2025.11130152","title":"ERMIS: A Cybersecurity Market for Assurance and Insurance-as-a-Service","display_name":"ERMIS: A Cybersecurity Market for Assurance and Insurance-as-a-Service","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679296","doi":"https://doi.org/10.1109/csr64739.2025.11130152"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130152","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119437388","display_name":"Antonios Paragioudakis","orcid":null},"institutions":[{"id":"https://openalex.org/I2802089456","display_name":"Analytical Services","ror":"https://ror.org/04g2rbh88","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I2802089456"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Antonios Paragioudakis","raw_affiliation_strings":["Sphynx Analytics LTD,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Sphynx Analytics LTD,Nicosia,Cyprus","institution_ids":["https://openalex.org/I2802089456"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015879995","display_name":"Michail Smyrlis","orcid":"https://orcid.org/0000-0001-9527-516X"},"institutions":[{"id":"https://openalex.org/I2802089456","display_name":"Analytical Services","ror":"https://ror.org/04g2rbh88","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I2802089456"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michail Smyrlis","raw_affiliation_strings":["Sphynx Analytics LTD,Nicosia,Cyprus"],"affiliations":[{"raw_affiliation_string":"Sphynx Analytics LTD,Nicosia,Cyprus","institution_ids":["https://openalex.org/I2802089456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029587426","display_name":"Georgios Spanoudakis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Georgios Spanoudakis","raw_affiliation_strings":["Sphynx Technology Solutions AG,Zug,Switzerland"],"affiliations":[{"raw_affiliation_string":"Sphynx Technology Solutions AG,Zug,Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5119437388"],"corresponding_institution_ids":["https://openalex.org/I2802089456"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37817901,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"765","last_page":"770"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8823999762535095,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8823999762535095,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.772599995136261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7437999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7433618307113647},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.627435028553009},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5419074892997742},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4925883412361145},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.44229844212532043},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.36437922716140747},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.20970791578292847},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.1157815158367157}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7433618307113647},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.627435028553009},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5419074892997742},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4925883412361145},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.44229844212532043},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.36437922716140747},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.20970791578292847},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.1157815158367157}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130152","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130152","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2157087194","https://openalex.org/W3129506420","https://openalex.org/W3156588337","https://openalex.org/W3167765492","https://openalex.org/W3196595285","https://openalex.org/W4213292645","https://openalex.org/W4316664258","https://openalex.org/W4391987523","https://openalex.org/W4399909354","https://openalex.org/W4400321616"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2068742488","https://openalex.org/W2230785849","https://openalex.org/W1560578426","https://openalex.org/W2164412622","https://openalex.org/W2140998642","https://openalex.org/W3015507676","https://openalex.org/W1505911254","https://openalex.org/W135913057","https://openalex.org/W2502697733"],"abstract_inverted_index":{"Today\u2019s":[0],"cyber":[1,45,57,83,178],"systems":[2],"and":[3,8,22,54,65,72,92,106,117,137,153,165,171,185],"services":[4],"depend":[5],"on":[6],"robust":[7],"reliable":[9],"cybersecurity":[10,130,151],"assurance":[11,138,152],"mechanisms":[12],"to":[13,44,61,86,149],"manage":[14],"the":[15,19,39,111,126,135,141],"inherent":[16],"uncertainties":[17],"of":[18,41,89,128,140,169],"digital":[20],"environment":[21],"build":[23],"trust":[24],"across":[25],"complex,":[26],"interconnected":[27],"ecosystems.":[28],"Traditional":[29],"defences":[30],"alone":[31],"cannot":[32],"keep":[33],"up":[34],"with":[35,125],"evolving":[36,93],"threats,":[37],"driving":[38],"adoption":[40],"innovative":[42,160],"approaches":[43],"risk":[46,84,179],"management.":[47],"Moreover,":[48],"as":[49,155],"attacks":[50],"grow":[51],"in":[52,80],"sophistication":[53],"frequency,":[55],"comprehensive":[56],"insurance":[58,119,154,186],"is":[59],"essential":[60],"cover":[62],"residual":[63],"risks":[64],"protect":[66],"organizations":[67],"from":[68],"potentially":[69],"devastating":[70],"financial":[71],"reputational":[73],"damage.":[74],"However,":[75],"insurers":[76],"often":[77],"face":[78],"challenges":[79],"accurately":[81],"quantifying":[82],"due":[85],"a":[87,97,156,167],"lack":[88],"standardized":[90],"data":[91],"threat":[94],"vectors.":[95],"As":[96],"result,":[98],"policies":[99],"can":[100,122],"be":[101],"outdated":[102],"or":[103],"offer":[104,150],"limited":[105],"inconsistent":[107],"coverage.":[108],"This":[109,132],"underscores":[110],"need":[112],"for":[113,177],"more":[114],"transparent,":[115],"data-driven,":[116],"adaptable":[118],"solutions":[120],"that":[121],"effectively":[123],"align":[124],"complexities":[127],"modern":[129],"demands.":[131],"paper":[133],"presents":[134],"cyber-insurance":[136],"solution":[139,147],"EUfunded":[142],"ERMIS":[143,146],"project.":[144],"The":[145],"aims":[148],"service":[157],"through":[158],"an":[159],"marketplace":[161],"platform.":[162],"By":[163],"integrating":[164],"deploying":[166],"suite":[168],"tools":[170],"mechanisms,":[172],"it":[173],"provides":[174],"end-to-end":[175],"support":[176],"assessment,":[180],"security":[181],"certification":[182],"readiness":[183],"models,":[184],"underwriting.":[187]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
