741
Views
24
CrossRef citations to date
0
Altmetric
General Paper

Contagion in cyber security attacks

, , , &
Pages 780-791 | Published online: 21 Dec 2017

References

  • Aït-SahaliaYCacho-DiazJLaevenRJModeling financial contagion using mutually exciting jump processesJournal of Financial Economics2015117358560610.1016/j.jfineco.2015.03.002
  • Bachrach Y, Draief M and Goyal S (2011). Security games with contagion. Manuscript, 2011: http://www.econ.cam.ac.uk/faculty/goyal/wp11/securitygames17.pdf.
  • Barndorff-NielsenOEHansenPRLundeAShephardNMultivariate realised kernels: Consistent positive semi-definite estimators of the covariation of equity prices with noise and non-synchronous tradingJournal of Econometrics2011162214916910.1016/j.jeconom.2010.07.009
  • BillingsleyPProbability and Measure1995
  • Böhme R and Kataria G (2006b). Models and measures for correlation in cyber-insurance. In: Anderson R (ed). Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Robinson College, University of Cambridge, http://weis2006.econinfosec.org; http://weis2006.econinfosec.org/docs/16.pdf.
  • Böhme R and Kataria G (2006a). A closer look at attack clustering. In: Schecter S (ed). Proceedings of the I3P Workshop on the Economics of Securing the Information Infrastructure, Washington DC, http://wesii.econinfosec.org/workshop/; http://wesii.econinfosec.org/draft.php?paper_id=35.
  • Böhme R and Schwartz G (2010). Modeling cyber-insurance: Towards a unifying framework. In: Moore T (ed). Proceedings of the Ninth Workshop on the Economics of Information Security (WEIS 2010), Harvard, http://weis2010.econinfosec.org; http://weis2010.econinfosec.org/papers/session5/weis2010_boehme.pdf.
  • Grossklags J, Christin N and Chuang J (2008). Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents. In: Proceedings (online) of the Seventh Workshop on the Economics of Information Security (WEIS), Hanover, NH.
  • HawkesABunching in a semi-Markov processJournal of Applied Probability1970717518210.1017/S0021900200027030
  • HawkesAPoint spectra of some mutually exciting point processesJournal of the Royal Statistical Society, Series B197133438443
  • HawkesASpectra of some self-exciting and mutually exciting point processesBiometrika197158839010.1093/biomet/58.1.83
  • HullJCOptions, Futures and Other Derivatives2006
  • Ioannidis C, Pym D and Williams J (2009). Investments and trade-offs in the economics of information security. In: Dingledine R and Golle P (eds). Proc. Financial Cryptography and Data Security ‘09, Volume 5628 of LNCS, pp 148–166. Springer: Berlin, Heidelberg, New York.
  • IoannidisCPymDWilliamsJFixed costs, investment rigidities, and risk aversion in information security: A utility-theoretic approachEconomics of Security and Privacy III2012171192
  • IoannidisCPymDWilliamsJInformation security trade-offs and optimal patching policiesEuropean Journal of Operational Research2012216243444410.1016/j.ejor.2011.05.050
  • Lelarge M (2009). Economics of malware: Epidemic risks model, network externalities and incentives. In. Communication, Control, and Computing. Allerton 2009. 47th Annual Allerton Conference on, pp 1353-1360, IEEE.
  • LelargeMBolotJNetwork externalities and the deployment of security features and protocols in the internetACM SIGMETRICS Performance Evaluation Review2008361374810.1145/1384529.1375463
  • Parachuri P, Pearce J, Tambe M, Ordonez F and Kraus S (2007). An efficient heuristic approach for security against multiple adversaries. In. Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems. ACM.
  • ProtterPStochastic Integration and Differential Equations2004
  • University of Georgia, Office of Information Security (2012). Information classification standard, http://infosec.uga.edu/policies/classification.php.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.