{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:55:31Z","timestamp":1775109331087,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319255934","type":"print"},{"value":"9783319255941","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25594-1_2","type":"book-chapter","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T02:03:13Z","timestamp":1447207393000},"page":"22-34","source":"Crossref","is-referenced-by-count":14,"title":["Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks"],"prefix":"10.1007","author":[{"given":"Yezekael","family":"Hayel","sequence":"first","affiliation":[]},{"given":"Quanyan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCS.2014.2364710","volume":"35","author":"Q Zhu","year":"2015","unstructured":"Zhu, Q., Ba\u015far, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 35(1), 46\u201365 (2015)","journal-title":"IEEE Control Syst."},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314, 610\u2013613 (2006)","journal-title":"Science"},{"key":"2_CR3","unstructured":"Kesan, J., Majuca, R., Yurcik, W.: Cyber-insurance as a market-based solution to the problem of cybersercurity: a case study. In: Proceedings of WEIS (2005)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Lelarge, M., Bolot, J.: A local mean field analysis of security investments in networks. In: Proceedings of ACM NetEcon (2008)","DOI":"10.1145\/1403027.1403034"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Pal, R., Golubchik, L., Psounis, K., Hui, P.: Will cyber-insurance improve network security? a market analysis. In: Proceedings of INFOCOM (2014)","DOI":"10.1109\/INFOCOM.2014.6847944"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.2307\/3003320","volume":"10","author":"B H\u00f6lmstrom","year":"1979","unstructured":"H\u00f6lmstrom, B.: Moral hazard and observability. Bell J. Econ. 10(1), 74\u201391 (1979)","journal-title":"Bell J. Econ."},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"324","DOI":"10.2307\/3003457","volume":"13","author":"B Holmstrom","year":"1982","unstructured":"Holmstrom, B.: Moral hazard in teams. Bell J. Econ. 13(2), 324\u2013340 (1982)","journal-title":"Bell J. Econ."},{"key":"2_CR8","unstructured":"Lelarge, M., Bolot, J.: Cyber insurance as an incentive for internet security. In: Proceedings of WEIS (2008)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Acemoglu, D., Malekian, A., Ozdaglar, A.: Network security and contagion. Perform. Eval. Rev. 42(3) (2014)","DOI":"10.1145\/2695533.2695546"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1093\/restud\/rdu013","volume":"81","author":"S Goyal","year":"2014","unstructured":"Goyal, S., Vigier, A.: Attack, defense and contagion in networks. Rev. Econ. Stud. 81(4), 1518\u20131542 (2014)","journal-title":"Rev. Econ. Stud."},{"key":"2_CR11","unstructured":"B\u00f6hme, R., Schwartz, G.: Modeling cyber-insurance: towards a unifying framework. In: Proceedings of WEIS (2010)"},{"key":"2_CR12","unstructured":"Naghizadeh, P., Liu, M.: Voluntary participation in cyber-insurance markets. In: Proceedings of WEIS (2014)"},{"key":"2_CR13","unstructured":"Raymond Law Group: Protecting the individual from data breach. In: The National LawReview (2014)"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1086\/260352","volume":"83","author":"S Peltzmann","year":"1975","unstructured":"Peltzmann, S.: The effects of automobile safety regulation. J. Polit. Econ. 83(4), 677\u2013726 (1975)","journal-title":"J. Polit. Econ."},{"key":"2_CR15","volume-title":"Dynamic Noncooperative Game Theory","author":"T Ba\u015far","year":"1995","unstructured":"Ba\u015far, T., Olsder, G.J.: Dynamic Noncooperative Game Theory, vol. 200. SIAM, Philadelphia (1995)"},{"key":"2_CR16","volume-title":"Optimization by Vector Space Methods","author":"DG Luenberger","year":"1997","unstructured":"Luenberger, D.G.: Optimization by Vector Space Methods. Wiley, New York (1997)"},{"key":"2_CR17","volume-title":"The Mathematical Theory of Infectious Diseases and its Applications","author":"NTJ Bailey","year":"1975","unstructured":"Bailey, N.T.J., et al.: The Mathematical Theory of Infectious Diseases and its Applications. Charles Griffin & Company Ltd., London (1975). 5a Crendon Street, High Wycombe, Bucks HP13 6LE"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25594-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:08:33Z","timestamp":1559311713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25594-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255934","9783319255941"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25594-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}