{"id":"https://openalex.org/W3156757903","doi":"https://doi.org/10.1145/3409959","title":"Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation","display_name":"Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation","publication_year":2021,"publication_date":"2021-04-20","ids":{"openalex":"https://openalex.org/W3156757903","doi":"https://doi.org/10.1145/3409959","mag":"3156757903"},"language":"en","primary_location":{"id":"doi:10.1145/3409959","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3409959","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3409959","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3409959","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100335820","display_name":"Li Wang","orcid":"https://orcid.org/0000-0001-6224-6469"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Li Wang","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009505287","display_name":"S. S. Iyengar","orcid":"https://orcid.org/0000-0003-2944-8178"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Sitharama Iyengar","raw_affiliation_strings":["Florida International University, Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040320429","display_name":"Amith K. Belman","orcid":"https://orcid.org/0000-0003-1008-3025"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amith K. Belman","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043444372","display_name":"Pawe\u0142 \u015aniata\u0142a","orcid":"https://orcid.org/0000-0002-1792-8441"},"institutions":[{"id":"https://openalex.org/I46597724","display_name":"Pozna\u0144 University of Technology","ror":"https://ror.org/00p7p3302","country_code":"PL","type":"education","lineage":["https://openalex.org/I46597724"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Pawe\u0142 \u015aniata\u0142a","raw_affiliation_strings":["Pozna\u0144 University of Technology, Pozna\u0144, Poland"],"affiliations":[{"raw_affiliation_string":"Pozna\u0144 University of Technology, Pozna\u0144, Poland","institution_ids":["https://openalex.org/I46597724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071471344","display_name":"Vir V. Phoha","orcid":"https://orcid.org/0000-0002-5390-8253"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vir V. Phoha","raw_affiliation_strings":["Syracuse University, Syracuse, NY, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, Syracuse, NY, USA","institution_ids":["https://openalex.org/I70983195"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034654064","display_name":"Changsheng Wan","orcid":"https://orcid.org/0000-0002-0303-2521"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changsheng Wan","raw_affiliation_strings":["Southeast University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Southeast University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100335820"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":0.1543,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41322811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":"2","first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.776864230632782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6117815971374512},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5746190547943115},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46224308013916016},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.42801064252853394},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4233369827270508},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.41165611147880554},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35778576135635376}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.776864230632782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6117815971374512},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5746190547943115},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46224308013916016},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.42801064252853394},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4233369827270508},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.41165611147880554},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35778576135635376},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3409959","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3409959","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3409959","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3409959","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3409959","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3409959","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2279853913","display_name":null,"funder_award_id":"W911NF-19-1","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G5921281487","display_name":null,"funder_award_id":"number","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5954017191","display_name":null,"funder_award_id":"1527795","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G608057831","display_name":null,"funder_award_id":"W911NF-19","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6339649352","display_name":null,"funder_award_id":"W911NF-19-1-0362","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8415477955","display_name":null,"funder_award_id":"W911NF-19","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3156757903.pdf","grobid_xml":"https://content.openalex.org/works/W3156757903.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W814822819","https://openalex.org/W1502560686","https://openalex.org/W1972688933","https://openalex.org/W2027032949","https://openalex.org/W2034102815","https://openalex.org/W2061354941","https://openalex.org/W2067050450","https://openalex.org/W2072498559","https://openalex.org/W2078753106","https://openalex.org/W2089842256","https://openalex.org/W2098376610","https://openalex.org/W2129278597","https://openalex.org/W2138986810","https://openalex.org/W2154370380","https://openalex.org/W2156983464","https://openalex.org/W2167326844","https://openalex.org/W2195555736","https://openalex.org/W2311880092","https://openalex.org/W2411275302","https://openalex.org/W2467495308","https://openalex.org/W2531534636","https://openalex.org/W2724243072","https://openalex.org/W2760626209","https://openalex.org/W2794377947","https://openalex.org/W2808869835","https://openalex.org/W2888279577","https://openalex.org/W2898437024","https://openalex.org/W2900879715","https://openalex.org/W2909480367","https://openalex.org/W2962935908","https://openalex.org/W2983562558","https://openalex.org/W4211043782","https://openalex.org/W4242866185","https://openalex.org/W4245287850","https://openalex.org/W4246208098","https://openalex.org/W4252889587"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W1967649051","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2811264706"],"abstract_inverted_index":{"Potential":[0],"for":[1,10,21,95,119,132,200],"huge":[2],"loss":[3],"from":[4,139,237],"malicious":[5,45,262],"exploitation":[6],"of":[7,12,14,33,40,44,61,67,73,82,85,105,124,159,187,206,233,244,251,270],"software":[8,113,128,179],"calls":[9],"development":[11],"principles":[13],"cyber-insurance.":[15],"Estimating":[16],"what":[17,25],"to":[18,49,56,101,137,273],"insure":[19],"and":[20,24,42,78,87,107,127,147,150,161,180,218,220,228,241,253,275],"how":[22],"much":[23],"might":[26],"be":[27,175,269],"the":[28,34,38,65,71,74,79,83,108,117,171,178,181,185,191,201,207,221,278],"premiums":[29,110],"poses":[30],"challenges":[31],"because":[32],"uncertainties,":[35],"such":[36,142],"as":[37,143],"timings":[39],"emergence":[41],"lethality":[43],"apps,":[46],"human":[47],"propensity":[48],"favor":[50],"ease":[51],"by":[52,70,98,177,254],"giving":[53],"more":[54],"privilege":[55],"downloaded":[57],"apps":[58],"over":[59,156],"inconvenience":[60],"delay":[62],"or":[63],"functionality,":[64],"chance":[66],"infection":[68],"determined":[69],"lifestyle":[72],"mobile":[75,194],"device":[76],"user,":[77],"monetary":[80,103],"value":[81,104],"compromise":[84],"software,":[86],"so":[88,148],"on.":[89],"We":[90,183],"provide":[91,168],"a":[92,157,259],"theoretical":[93],"framework":[94,189,240],"cyber-insurance":[96,246],"backed":[97],"game-theoretic":[99,249],"formulation":[100],"calculate":[102],"risk":[106],"insurance":[109],"associated":[111],"with":[112],"compromise.":[114],"By":[115],"establishing":[116],"conditions":[118],"Nash":[120],"equilibrium":[121],"between":[122],"strategies":[123,172,252],"an":[125],"adversary":[126,138],"we":[129,167],"derive":[130],"probabilities":[131],"risk,":[133],"potential":[134],"loss,":[135],"gain":[136],"app":[140,230,263],"categories,":[141],"lifestyles,":[144],"entertainment,":[145],"education,":[146],"on,":[149],"their":[151],"prevalence":[152],"ratios.":[153],"Using":[154],"simulations":[155],"range":[158],"possibilities,":[160],"using":[162],"publicly":[163],"available":[164],"malware":[165,195,211],"statistics,":[166],"insights":[169,243,267],"about":[170],"that":[173,204],"can":[174],"taken":[176],"adversary.":[182],"show":[184],"application":[186],"our":[188,234],"on":[190,258],"most":[192],"recent":[193,260],"data":[196,264],"(2018":[197],"ISTR":[198],"report\u2014data":[199],"year":[202],"2017)":[203],"consists":[205],"top":[208],"five":[209],"Android":[210],"apps:":[212],"Malapp,":[213],"Fakeinst,":[214],"Premiumtext,":[215],"Maldownloader":[216],",":[217],"Simplelocker":[219],"resulting":[222],"leaked":[223],"phone":[224],"number,":[225],"location":[226],"information,":[227],"installed":[229],"information.":[231],"Uniqueness":[232],"work":[235],"stems":[236],"developing":[238],"mathematical":[239],"providing":[242],"estimating":[245],"parameters":[247],"through":[248],"choice":[250],"showing":[255],"its":[256],"efficacy":[257],"real":[261],".":[265],"These":[266],"will":[268],"tremendous":[271],"help":[272],"researchers":[274],"practitioners":[276],"in":[277],"security":[279],"community.":[280]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
