-
1
-
-
81755168899
-
System Reliability and Free Riding
-
Varian, H.: System Reliability and Free Riding. In: ACM ICEC (2003)
-
ACM ICEC (2003)
-
-
Varian, H.1
-
2
-
-
70349686853
-
Economic Incentives to Increase Security in the Internet: The Case for Insurance
-
Lelarge, M., Bolot, J.: Economic Incentives to Increase Security in the Internet: The Case for Insurance. In: IEEE INFOCOM (2009)
-
IEEE INFOCOM (2009)
-
-
Lelarge, M.1
Bolot, J.2
-
3
-
-
81755167562
-
Analyzing Self-Defense Investments in the Internet under Cyberinsurance Coverage
-
Pal, R., Golubchik, L.: Analyzing Self-Defense Investments In The Internet Under Cyberinsurance Coverage. In: IEEE ICDCS (2010)
-
IEEE ICDCS (2010)
-
-
Pal, R.1
Golubchik, L.2
-
4
-
-
79959243929
-
Modeling Cyberinsurance: Towards A Unifying Framework
-
Bohme, R., Schwartz, G.: Modeling Cyberinsurance: Towards A Unifying Framework. In: WEIS (2010)
-
WEIS (2010)
-
-
Bohme, R.1
Schwartz, G.2
-
5
-
-
84861654300
-
Competitive Cyberinsurance and Internet Security
-
Shetty, N., Schwarz, G., Feleghyazi, M., Walrand, J.: Competitive Cyberinsurance and Internet Security. In: WEIS (2009)
-
WEIS (2009)
-
-
Shetty, N.1
Schwarz, G.2
Feleghyazi, M.3
Walrand, J.4
-
6
-
-
67650416963
-
Protecting Against Network Infections: A Game-Theoretic Perspective
-
Omic, J., Orda, A., Mieghem, V.P.: Protecting Against Network Infections: A Game-Theoretic Perspective. In: IEEE INFOCOM (2009)
-
IEEE INFOCOM (2009)
-
-
Omic, J.1
Orda, A.2
Mieghem, V.P.3
-
8
-
-
81755162697
-
Security and Insurance Management in Networks with Heterogenous Agents
-
Grossklags, J., Christin, G., Chuang, J.: Security and Insurance Management in Networks with Heterogenous Agents. In: ACM EC (2008)
-
ACM EC (2008)
-
-
Grossklags, J.1
Christin, G.2
Chuang, J.3
-
11
-
-
70350389209
-
Blue versus Red: Towards a Model of Distributed Security Attacks
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Fultz, N., Grossklags, J.: Blue versus Red: Towards a Model of Distributed Security Attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
12
-
-
57349198694
-
Secure or Insure? A Game-Theoretic Analysis of Information Security Games
-
Grossklags, J., Christin, N., Chuang, J.: Secure or Insure? A Game-Theoretic Analysis of Information Security Games. In: WWW (2008)
-
WWW (2008)
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
14
-
-
81755170255
-
Who Should Be Responsible for Software Security?
-
Terrence, A., Tunca, I.T.: Who Should Be Responsible for Software Security? Management Science 57(5) (2011)
-
(2011)
Management Science
, vol.57
, Issue.5
-
-
Terrence, A.1
Tunca, I.T.2
-
15
-
-
70349977415
-
Uncertainty in Weakest-Link Security Game
-
Grossklags, J., Johnson, B.: Uncertainty In Weakest-Link Security Game. In: GameNets (2009)
-
(2009)
GameNets
-
-
Grossklags, J.1
Johnson, B.2
-
17
-
-
77955321664
-
When Information Improves Information Security
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
Grossklags, J., Johnson, B., Christin, N.: When Information Improves Information Security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416-423. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 416-423
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
18
-
-
78049362316
-
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 588-606. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 588-606
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
19
-
-
78650721633
-
Uncertainty in Interdependent Security Games
-
Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. Springer, Heidelberg
-
Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Uncertainty in Interdependent Security Games. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 234-244. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6442
, pp. 234-244
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
20
-
-
18744389789
-
Assortative Mixing in Networks
-
Newman, M.E.J.: Assortative Mixing in Networks. Phy. Rev. Lett. 89 (2002)
-
(2002)
Phy. Rev. Lett.
, vol.89
-
-
Newman, M.E.J.1
-
21
-
-
0001382704
-
Association of Random Variables with Applications
-
Esary, J.D., Proschan, F., Walkup, W.: Association of Random Variables With Applications. Annals of Mathematical Statistics 38(5) (1967)
-
(1967)
Annals of Mathematical Statistics
, vol.38
, Issue.5
-
-
Esary, J.D.1
Proschan, F.2
Walkup, W.3
-
24
-
-
73149104832
-
Network Games
-
Galeotti, A., Goyal, S., Jackson, M.O., Vega-Redondo, F., Yariv, L.: Network Games. Review of Economic Studies 77(1) (2010)
-
(2010)
Review of Economic Studies
, vol.77
, Issue.1
-
-
Galeotti, A.1
Goyal, S.2
Jackson, M.O.3
Vega-Redondo, F.4
Yariv, L.5
-
27
-
-
38949171168
-
-
Technical Report
-
Galeotti, A., Goyal, S., Jackson, M.O., Vega-Redondo, F., Yariv, L.: Network Games. Technical Report (2006)
-
(2006)
Network Games
-
-
Galeotti, A.1
Goyal, S.2
Jackson, M.O.3
Vega-Redondo, F.4
Yariv, L.5
-
29
-
-
67650118856
-
The Complexity of Computing A Nash Equilibrium
-
Daskalakis, C., Goldberg, P.W., Papadimitrou, C.H.: The Complexity of Computing A Nash Equilibrium. SIAM Journal of Computing 39(1) (2009)
-
(2009)
SIAM Journal of Computing
, vol.39
, Issue.1
-
-
Daskalakis, C.1
Goldberg, P.W.2
Papadimitrou, C.H.3
-
33
-
-
0344792106
-
Managing Online Security Risks
-
June 1
-
Varian, H.: Managing Online Security Risks. The New York Times (June 1, 2000)
-
(2000)
The New York Times
-
-
Varian, H.1
-
34
-
-
81755168892
-
-
Allerton
-
Ko-Miura, A.R., Yolken, B., Bambos, N., Mitchell, J.: Security Investment Games of Interdependent Organizations. Allerton (2008)
-
(2008)
Security Investment Games of Interdependent Organizations
-
-
Ko-Miura, A.R.1
Yolken, B.2
Bambos, N.3
Mitchell, J.4
-
35
-
-
85020616309
-
Network Externalities, Competition, and Compatibility
-
Katz, M., Shapiro, C.: Network Externalities, Competition, and Compatibility. The American Economic Review 75(3) (1985)
-
(1985)
The American Economic Review
, vol.75
, Issue.3
-
-
Katz, M.1
Shapiro, C.2
-
37
-
-
84900406382
-
Cyberinsurance As A Market-Based Solution to the Problem of Cyber-Security: A Case Study
-
Kesan, J., Majuca, R., Yurcik, W.: Cyberinsurance As A Market-Based Solution To The Problem of Cyber-Security: A Case Study. In: WEIS (2005)
-
WEIS (2005)
-
-
Kesan, J.1
Majuca, R.2
Yurcik, W.3
-
38
-
-
77955870009
-
Its the Economics Stupid
-
Scheier, B.: Its The Economics Stupid. In: WEIS (2002)
-
WEIS (2002)
-
-
Scheier, B.1
-
39
-
-
84941158228
-
Cyberinsurance: A Market Solution to the Internet Security Market Failure
-
Yurcik, W., Doss, D.: Cyberinsurance: A Market Solution To The Internet Security Market Failure. In: WEIS (2002)
-
WEIS (2002)
-
-
Yurcik, W.1
Doss, D.2
-
40
-
-
78649633532
-
Cyberinsurance As An Incentive for Internet Security
-
Lelarge, M., Bolot, J.: Cyberinsurance As An Incentive for Internet Security. In: WEIS (2008)
-
WEIS (2008)
-
-
Lelarge, M.1
Bolot, J.2
-
42
-
-
50149103364
-
Insurance and the Computer Industry
-
Schneier, B.: Insurance and the Computer Industry. Communications of the ACM 44(3) (2001)
-
(2001)
Communications of the ACM
, vol.44
, Issue.3
-
-
Schneier, B.1
-
43
-
-
84944232084
-
Interdependence of Reliability and Security
-
Honeyman, P., Schwarz, G.: Interdependence of Reliability and Security. In: WEIS (2007)
-
WEIS (2007)
-
-
Honeyman, P.1
Schwarz, G.2
-
46
-
-
43249108668
-
When is A Coinsurance-Type Insurance Policy Inferior or even Giffen
-
Hau, A.: When is A Coinsurance-Type Insurance Policy Inferior or Even Giffen. Journal of Risk and Insurance 75(2) (2008)
-
(2008)
Journal of Risk and Insurance
, vol.75
, Issue.2
-
-
Hau, A.1
-
47
-
-
81755183140
-
A Local Mean Field Analysis of Security Investments in Networks
-
Lelarge, M., Bolot, J.: A Local Mean Field Analysis of Security Investments in Networks. In: ACM NetEcon (2008)
-
(2008)
ACM NetEcon
-
-
Lelarge, M.1
Bolot, J.2
-
48
-
-
57349135233
-
Network Externalities and the Deployment of Security Features and Protocols in the Internet
-
Lelarge, M., Bolot, J.: Network Externalities and The Deployment of Security Features and Protocols in the Internet. In: ACM SIGMETRICS (2008)
-
ACM SIGMETRICS (2008)
-
-
Lelarge, M.1
Bolot, J.2
-
49
-
-
81755162682
-
Internet Wikipedia Source
-
Internet Wikipedia Source. Information Asymmetry
-
Information Asymmetry
-
-
|