1,184
Views
42
CrossRef citations to date
0
Altmetric
Original Articles

Modeling and predicting extreme cyber attack rates via marked point processes

, , &
Pages 2534-2563 | Received 04 Jan 2016, Accepted 31 Oct 2016, Published online: 17 Nov 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Lu Li, Weiwei Zhuang & Guoxin Qiu. (2023) Modeling and predicting Chinese stock downside risks via Gaussian mixture models and marked self-exciting point process. Communications in Statistics - Simulation and Computation 52:12, pages 6249-6267.
Read now
Zijian Fang, Peng Zhao, Maochao Xu, Shouhuai Xu, Taizhong Hu & Xing Fang. (2022) Statistical modeling of computer malware propagation dynamics in cyberspace. Journal of Applied Statistics 49:4, pages 858-883.
Read now
Jie Chen. (2021) Editorial. Journal of Applied Statistics 48:1, pages 1-3.
Read now
Maochao Xu & Lei Hua. (2019) Cybersecurity Insurance: Modeling and Pricing. North American Actuarial Journal 23:2, pages 220-249.
Read now
Yang Lu, Jinggong Zhang & Wenjun Zhu. Cyber risk modeling: a discrete multivariate count process approach. Scandinavian Actuarial Journal 0:0, pages 1-31.
Read now

Articles from other publishers (37)

Gabriela Zeller & Matthias Scherer. (2024) Is accumulation risk in cyber methodically underestimated?. European Actuarial Journal.
Crossref
Imdad Ali Shah, Raja Kumar Murugesan & Samina Rajper. 2024. Navigating Cyber Threats and Cybersecurity in the Logistics Industry. Navigating Cyber Threats and Cybersecurity in the Logistics Industry 59 89 .
Imdad Ali Shah, N. Z. Jhanjhi & Sayan Kumar Ray. 2024. Advances in Explainable AI Applications for Smart Cities. Advances in Explainable AI Applications for Smart Cities 297 316 .
Rong He, Zhuo Jin & Johnny Siu-Hang Li. (2024) Modeling and management of cyber risk: a cross-disciplinary review. Annals of Actuarial Science, pages 1-40.
Crossref
Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier & Sasa Pesic. (2024) Structural Model for Cyber Risk Loss Distribution of Multi-Tenant Smart Buildings: An Application to the Hospitality Sector. SSRN Electronic Journal.
Crossref
Liudong Xing. 2024. Reliability and Resilience in the Internet of Things. Reliability and Resilience in the Internet of Things 151 210 .
Caroline Hillairet, Anthony Réveillac & Mathieu Rosenbaum. (2023) An expansion formula for Hawkes processes and application to cyber-insurance derivatives. Stochastic Processes and their Applications 160, pages 89-119.
Crossref
Manasa R. & A. Jayanthila Devi. (2023) Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors. International Journal of Case Studies in Business, IT, and Education, pages 90-105.
Crossref
Daniel Zängerle & Dirk Schiereck. (2022) Modelling and predicting enterprise-level cyber risks in the context of sparse data availability. The Geneva Papers on Risk and Insurance - Issues and Practice 48:2, pages 434-462.
Crossref
Gabriela Zeller & Matthias A. Scherer. (2023) Is Accumulation Risk In Cyber Systematically Underestimated?. SSRN Electronic Journal.
Crossref
Shashika R. Muramudalige, Anura P. Jayasumana & Haonan Wang. (2023) A Feature Mapping Technique for Complex Data Object Generation With Likelihood and Deep Generative Approaches. IEEE Access 11, pages 136643-136653.
Crossref
Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott & Shouhuai Xu. 2023. Science of Cyber Security. Science of Cyber Security 60 81 .
Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu & Lin Chen. 2023. Science of Cyber Security. Science of Cyber Security 285 304 .
Mehdi Barati & Benjamin Yankson. (2022) Predicting the Occurrence of a Data Breach. International Journal of Information Management Data Insights 2:2, pages 100128.
Crossref
Eric Muhati & Danda B. Rawat. (2022) Hidden-Markov-Model-Enabled Prediction and Visualization of Cyber Agility in IoT Era. IEEE Internet of Things Journal 9:12, pages 9117-9127.
Crossref
Gabriela Zeller & Matthias Scherer. (2021) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12:1, pages 33-85.
Crossref
Martin Eling, Kwangmin Jung & Jeungbo Shim. (2022) Unraveling heterogeneity in cyber risks using quantile regressions. Insurance: Mathematics and Economics 104, pages 222-242.
Crossref
Imdad Ali Shah. 2022. Cybersecurity Measures for E-Government Frameworks. Cybersecurity Measures for E-Government Frameworks 187 222 .
N. Z. Jhanjhi, Muneer Ahmad, Muhammad Amir Khan & Manzoor Hussain. 2022. Cybersecurity Measures for E-Government Frameworks. Cybersecurity Measures for E-Government Frameworks 123 140 .
Raisa Dzhamtyrova & Carsten Maple. (2022) Dynamic cyber risk estimation with competitive quantile autoregression. Data Mining and Knowledge Discovery 36:2, pages 513-536.
Crossref
Eric Muhati & Danda B. Rawat. (2021) Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction. Adversarial Machine Learning for Inferring Augmented Cyber Agility Prediction.
Shouhuai Xu, Moti Yung & Jingguo Wang. (2021) Seeking Foundations for the Science of Cyber Security. Information Systems Frontiers 23:2, pages 263-267.
Crossref
Yannick Bessy-Roland, Alexandre Boumezoued & Caroline Hillairet. (2020) Multivariate Hawkes process for cyber insurance. Annals of Actuarial Science 15:1, pages 14-39.
Crossref
Zijian Fang, Maochao Xu, Shouhuai Xu & Taizhong Hu. (2021) A Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity. IEEE Transactions on Information Forensics and Security 16, pages 2186-2201.
Crossref
Md. Hamid Uddin, Md. Hakim Ali & Mohammad Kabir Hassan. (2020) Cybersecurity hazards and financial system vulnerability: a synthesis of literature. Risk Management 22:4, pages 239-309.
Crossref
Shouhuai Xu. (2020) The Cybersecurity Dynamics Way of Thinking and Landscape. The Cybersecurity Dynamics Way of Thinking and Landscape.
Gregory Levitin, Liudong Xing & Yanping Xiang. (2020) Optimal early warning defense of N-version programming service against co-resident attacks in cloud system. Reliability Engineering & System Safety 201, pages 106969.
Crossref
N. Ram Mohan & N. Praveen Kumar. (2020) Predicting and Analysis of Phishing Attacks and Breaches In E-Commerce Websites. International Journal of Scientific Research in Science, Engineering and Technology, pages 170-175.
Crossref
Xing Fang, Maochao Xu, Shouhuai Xu & Peng Zhao. (2019) A deep learning framework for predicting cyber attacks rates. EURASIP Journal on Information Security 2019:1.
Crossref
Jose David Mireles, Eric Ficke, Jin-Hee Cho, Patrick Hurley & Shouhuai Xu. (2019) Metrics Towards Measuring Cyber Agility. IEEE Transactions on Information Forensics and Security 14:12, pages 3217-3232.
Crossref
Liang Luo, Liudong Xing & Gregory Levitin. (2019) Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks. Reliability Engineering & System Safety 192, pages 106265.
Crossref
Shouhuai Xu. 2019. Proactive and Dynamic Network Defense. Proactive and Dynamic Network Defense 1 31 .
Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman & Shouhuai Xu. (2018) Modeling and Predicting Cyber Hacking Breaches. IEEE Transactions on Information Forensics and Security 13:11, pages 2856-2871.
Crossref
Stefano Chiaradonna, Petar Jevtic, Nicolas Lanchier & Sasa Pesic. (2022) Framework for Cyber Risk Loss Distribution of Client-Server Networks: A Bond Percolation Model and Industry Specific Case Studies. SSRN Electronic Journal.
Crossref
Yang Lu, Jinggong Zhang & Wenjun Zhu. (2021) Cyber Risk Modeling: A Discrete Multivariate Count Process Approach. SSRN Electronic Journal.
Crossref
Gabriela Zeller & Matthias A. Scherer. (2020) A Comprehensive Model for Cyber Risk Based on Marked Point Processes and Its Application to Insurance. SSRN Electronic Journal.
Crossref
Emad Yaghmaei, Ibo van de Poel, Markus Christen, Bert Gordijn, Nadine Kleine, Michele Loi, Gwenyth Morgan & Karsten Weber. (2017) Canvas White Paper 1 Cybersecurity and Ethics. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.