{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T07:37:38Z","timestamp":1776411458883,"version":"3.51.2"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051709","type":"print"},{"value":"9783030051716","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_5","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"88-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["RiskWriter: Predicting Cyber Risk of an Enterprise"],"prefix":"10.1007","author":[{"given":"K.","family":"Aditya","sequence":"first","affiliation":[]},{"given":"Slawomir","family":"Grzonkowski","sequence":"additional","affiliation":[]},{"given":"Nhien-An","family":"Le-Khac","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"5_CR1","unstructured":"ABI Research: Cyber insurance market to reach \\$10B by 2020. https:\/\/www.advisenltd.com\/2015\/07\/30\/abi-research-cyber-insurance-market-to-reach-10b-by-2020\/"},{"key":"5_CR2","doi-asserted-by":"crossref","DOI":"10.7249\/WR1208","volume-title":"Content Analysis of Cyber Insurance Policies: How do carriers write policies and price cyber risk?","author":"Sasha Romanosky","year":"2017","unstructured":"Romanosky, S., Ablon, L., Kuehn, A., Jones, RT.: Content Analysis of Cyber Insurance Policies: How Do Carriers Write Policies and Price Cyber Risk? RAND Corporation, Santa Monica (2017). https:\/\/www.rand.org\/pubs\/working_papers\/WR1208.html"},{"key":"5_CR3","unstructured":"Bogomolniy, O.: Cyber insurance conundrum: using CIS critical security controls for underwriting cyber risk (2017). https:\/\/www.sans.org\/reading-room\/whitepapers\/legal\/cyber-insurance-conundrum-cis-critical-security-controls-underwriting-cyber-risk-37572"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Pendleton, M., Garcia-Lebron, R., Cho, J.-H., Xu, S.: A survey on systems security metrics. In: ACM Computing Survey, February 2017","DOI":"10.1145\/3005714"},{"key":"5_CR5","unstructured":"Cai, F., Le-Khac, N.-A., Kechadi, M.-T.: Clustering approaches for financial data analysis: a survey. In: Proceeding of the 8th International Conference on Data Mining (DMIN 2012), NE, USA, July 2012"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"McInnes, L., Healy, J.: Accelerated hierarchical density based clustering. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp 33\u201342. IEEE (2017)","DOI":"10.1109\/ICDMW.2017.12"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-37456-2_14","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"RJGB Campello","year":"2013","unstructured":"Campello, R.J.G.B., Moulavi, D., Sander, J.: Density-based clustering based on hierarchical density estimates. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7819, pp. 160\u2013172. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37456-2_14"},{"key":"5_CR8","unstructured":"Ho, T.K.: Random decision forest. In: Proceedings of the 3rd International Conference on Document Analysis and Recognition, pp. 278\u2013282 (1995)"},{"issue":"1","key":"5_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"1995","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (1995)","journal-title":"Mach. Learn."},{"issue":"3","key":"5_CR10","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M.: Classification and regression by randomForest. R News 2(3), 18\u201322 (2002)","journal-title":"R News"},{"key":"5_CR11","unstructured":"Nagle, F., Ransbotham, S., Westerman, G.: The effects of security management on security events. In: Annual Workshop on the Economics of Information Security (2017)"},{"key":"5_CR12","unstructured":"Liu, Y., et al.: Cloudy with a chance of breach: forecasting cyber security incidents. In: USENIX Security, 1009\u20131024 (2015)"},{"issue":"5","key":"5_CR13","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1287\/mnsc.1040.0357","volume":"51","author":"K Kannan","year":"2005","unstructured":"Kannan, K., Telang, R.: Market for software vulnerabilities? Think again. Manag. Sci. 51(5), 726\u2013740 (2005)","journal-title":"Manag. Sci."},{"issue":"4","key":"5_CR14","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.2307\/41703500","volume":"36","author":"A Gupta","year":"2012","unstructured":"Gupta, A., Zhdanov, D.: Growth and sustainability of managed security services networks: an economic perspective. MIS Q. 36(4), 1109\u20131130 (2012)","journal-title":"MIS Q."},{"issue":"3","key":"5_CR15","doi-asserted-by":"crossref","first-page":"431","DOI":"10.2307\/25750685","volume":"34","author":"MA Mahmood","year":"2002","unstructured":"Mahmood, M.A., Siponen, M., Straub, D., Rao, H.R., Raghu, T.S.: Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Q. 34(3), 431\u2013433 (2002)","journal-title":"MIS Q."},{"key":"5_CR16","unstructured":"Moore, T., Dynes, S., Chang, F.R.: Identifying how firms manage cybersecurity investment. Southern Methodist University (2015). http:\/\/blog.smu.edu\/research\/files\/2015\/10\/SMU-IBM.pdf"},{"issue":"1","key":"5_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1093\/cybsec\/tyw004","volume":"2","author":"A Sarabi","year":"2016","unstructured":"Sarabi, A., Naghizadeh, P., Liu, Y., Liu, M.: Risky business: fine-grained data breach prediction using business profiles. J. Cybersecur. 2(1), 15\u201328 (2016)","journal-title":"J. Cybersecur."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Edwards, B., Hofmeyr, S., Stephanie, F.: Hype and heavy tails: a closer look at data breaches. In: Workshop on the Economics of Information Security, vol. 14 (2015)","DOI":"10.1093\/cybsec\/tyw003"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., Arnaldo, I., Cuesta-Infante, A., Korrapati, V., Basslas, C., Li, K.: AI$$^{2}$$: training a big data machine to defend. In Proceedings of the 2nd IEEE International Conference on Big Data Security (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Bilge, L., Han, Y., Dell\u2019Amico, M.: RiskTeller: predicting the risk of cyber incidents. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134022"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Kuppa, A., Grzonkowski, S., Le-Khac, N.-A.: Enabling trust in deep learning models: a digital forensics case study. In: Proceeding of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), NY, USA, 1\u20133 August 2018","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00172"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Nicolls, V., Chen, L., Scanlon, M., Le-Khac, N.-A.: IPv6 security and forensics. In: Proceeding of the 6th IEEE International Conference on Innovative Computing Technology (INTECH 2016), Dublin, Ireland, August 2016","DOI":"10.1109\/INTECH.2016.7845143"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:25:16Z","timestamp":1573053916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}