{"id":"https://openalex.org/W1977280022","doi":"https://doi.org/10.1145/2566468.2566481","title":"Cyber-insurance framework for large scale interdependent networks","display_name":"Cyber-insurance framework for large scale interdependent networks","publication_year":2014,"publication_date":"2014-04-15","ids":{"openalex":"https://openalex.org/W1977280022","doi":"https://doi.org/10.1145/2566468.2566481","mag":"1977280022"},"language":"en","primary_location":{"id":"doi:10.1145/2566468.2566481","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2566468.2566481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd international conference on High confidence networked systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076396570","display_name":"Galina Schwartz","orcid":null},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Galina A. Schwartz","raw_affiliation_strings":["UC-Berkeley, Berkeley, CA, USA","UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC-Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]},{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062722286","display_name":"Shankar Sastry","orcid":"https://orcid.org/0009-0000-9021-7235"},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Shankar Sastry","raw_affiliation_strings":["UC-Berkeley, Berkeley, CA, USA","UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC-Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]},{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076396570"],"corresponding_institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":3.9445,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.93649025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"154"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11720","display_name":"Probability and Risk Models","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9775000214576721,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.7128795385360718},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6914987564086914},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6072577238082886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6049392223358154},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5929322242736816},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4984712600708008},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.45493564009666443},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.08337467908859253},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.07591432332992554}],"concepts":[{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.7128795385360718},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6914987564086914},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6072577238082886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6049392223358154},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5929322242736816},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4984712600708008},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.45493564009666443},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.08337467908859253},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.07591432332992554},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2566468.2566481","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2566468.2566481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd international conference on High confidence networked systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1521604383","display_name":null,"funder_award_id":"CNS-0910711","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G5161698946","display_name":null,"funder_award_id":"CNS-1239166","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G5461704254","display_name":null,"funder_award_id":"FA9550-06-1-0244","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G6937232228","display_name":null,"funder_award_id":"CCF-0424422","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"}],"funders":[{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W106782957","https://openalex.org/W1516366611","https://openalex.org/W1533691955","https://openalex.org/W1591064165","https://openalex.org/W2009167161","https://openalex.org/W2031535643","https://openalex.org/W2078309362","https://openalex.org/W2121034459","https://openalex.org/W2126949246","https://openalex.org/W2156109180","https://openalex.org/W2165913973","https://openalex.org/W2168337670","https://openalex.org/W2190277949","https://openalex.org/W2488745276","https://openalex.org/W3205357727","https://openalex.org/W4236841844","https://openalex.org/W4302404214"],"related_works":["https://openalex.org/W2139079562","https://openalex.org/W2749324135","https://openalex.org/W2908433117","https://openalex.org/W2969604939","https://openalex.org/W2378306841","https://openalex.org/W114687057","https://openalex.org/W2367468089","https://openalex.org/W2358591856","https://openalex.org/W3122988618","https://openalex.org/W1994631104"],"abstract_inverted_index":{"This":[0],"article":[1],"presents":[2],"a":[3,35,38,71,79,99,160,169],"framework":[4,206],"for":[5,81,110,214],"managing":[6,187],"cyber-risks":[7],"in":[8,88,125],"large-scale":[9],"interdependent":[10,73],"networks":[11],"where":[12],"cyber":[13,93],"insurers":[14,94,143],"are":[15,144],"strategic":[16],"players.":[17,54],"In":[18,55,190],"our":[19,192],"earlier":[20],"work,":[21],"we":[22,32,58,77,97,114,127],"imposed":[23],"that":[24,165],"breach":[25,64],"probability":[26,65],"of":[27,40,52,63,85,137,151,186,202],"each":[28,86],"network":[29,74,102,111,117,173,212],"node":[30,87],"(which":[31],"view":[33,181],"as":[34,168,183,199],"player)":[36],"is":[37],"function":[39],"two":[41,119],"variables:":[42],"first,":[43],"player":[44],"own":[45],"security":[46,51,83,149],"action":[47],"and":[48,91,106,123,175],"second,":[49],"average":[50],"all":[53],"this":[56],"article,":[57],"formally":[59],"derive":[60,107],"the":[61,67,108,116,138,195,200,210],"expression":[62,109],"from":[66],"standard":[68],"assumptions.":[69],"For":[70],"homogeneous":[72],"(identical":[75],"users),":[76],"provide":[78,218],"solution":[80],"optimal":[82],"choice":[84],"environments":[89],"without":[90],"with":[92,118],"present.":[95],"Then,":[96],"introduce":[98],"general":[100],"heterogeneous":[101],"(many":[103],"user":[104,120,130],"types),":[105],"security.":[112,204],"Lastly,":[113],"consider":[115],"types":[121],"(normal":[122],"malicious),":[124],"which":[126,178],"allow":[128],"one":[129],"type":[131],"(malicious":[132],"users)":[133],"to":[134,146,171,180,208,217],"subvert":[135],"monitoring":[136],"insurers,":[139],"even":[140],"if":[141],"these":[142],"able":[145],"perfectly":[147],"enforce":[148],"levels":[150],"normal":[152],"users":[153],"(at":[154],"zero":[155],"cost).":[156],"Our":[157,205],"analysis":[158],"confirms":[159],"discrepancy":[161],"between":[162],"informal":[163],"arguments":[164],"favor":[166],"cyber-insurance":[167,198],"tool":[170],"improve":[172],"security,":[174],"formal":[176],"models,":[177],"tend":[179],"insurance":[182],"an":[184],"instrument":[185],"risks":[188],"only.":[189],"particular,":[191],"results":[193],"support":[194],"case":[196],"against":[197],"means":[201],"improving":[203,215],"helps":[207],"identify":[209],"crucial":[211],"parameters":[213],"incentives":[216],"secure":[219],"networks.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
