共 40 条
- [1] Controlling increasingly complex Interlinking: Cybersecurity risk trends, Shanghai Insurance Monthly, 1, pp. 35-39, (2021)
- [2] Yang N D, Wang J B, Zhang Y L, Et al., Risk propagation modeling and simulation in R&D network when considering the adaptive behaviors[J], Chinese Journal of Management Science, 28, 3, pp. 182-190, (2020)
- [3] Bolot J C, Lelarge M., A new perspective on internet security using insurance[C], IEEE INFOCOM 2008 — The 27th Conference on Computer Communications, pp. 1948-1956, (2008)
- [4] Khalili M M, Naghizadeh P, Liu M., Designing cyber insurance policies: The role of pre-screening and security interdependence[J], IEEE Transactions on Information Forensics and Security, 13, 9, pp. 2226-2239, (2018)
- [5] Herath H S B, Herath T C., Investments in information security: A real options perspective with Bayesian postaudit[J], Journal of Management Information Systems, 25, 3, pp. 337-375, (2008)
- [6] Pate-Cornell M E, Kuypers M, Smith M, Et al., Cyber risk management for critical infrastructure: A risk analysis model and three case studies[J], Risk Analysis, 38, 2, pp. 226-241, (2018)
- [7] Armenia S, Angelini M, Nonino F, Et al., A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs, Decision Support Systems, 147, (2021)
- [8] Pan C X, Zhong W J, Mei S E, Et al., Enterprise network security investment strategies when facing different vulnerabilities with budget constraints[J], Journal of University of Electronic Science and Technology of China (Social Sciences Edition), 20, 4, pp. 27-34, (2018)
- [9] Gordon L A, Loeb M P, Sohail T., A framework for using insurance for cyber-risk management[J], Communications of the ACM, 46, 3, pp. 81-85, (2003)
- [10] Majuca R P, Yurcik W, Kesan J P., The evolution of cyber insurance, ACM Computing Research Repository, (2006)