{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T21:43:24Z","timestamp":1758404604074,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/ccta.2017.8062752","type":"proceedings-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T20:33:56Z","timestamp":1508877236000},"page":"2027-2032","source":"Crossref","is-referenced-by-count":4,"title":["Optimal risk management in critical infrastructures against cyber-adversaries"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Barreto","sequence":"first","affiliation":[]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Non-life insurance mathematics an introduction with stochastic processes","year":"2006","author":"mikosch","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1086\/259916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2015.14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1322638111"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2967612"},{"key":"ref15","volume":"17","author":"beck","year":"1992","journal-title":"Risk Society Towards a New Modernity"},{"key":"ref16","volume":"30","author":"hern\u00e1ndez-lerma","year":"2012","journal-title":"Discrete-Time Markov Control Processes Basic Optimality Criteria"},{"key":"ref17","article-title":"Dynamic programming and inventory control, volume 3 of studies in probability","volume":"1","author":"bensoussan","year":"2011","journal-title":"Optimization in Statistics"},{"key":"ref4","article-title":"Perverse incentives in security contracts: A case study in the colombian power grid","author":"barreto","year":"2016","journal-title":"Workshop on the Economics of Information Security (WEIS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403034"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12601-2_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2310911"},{"journal-title":"Against the Gods The Remarkable Story of Risk","year":"1996","author":"bernstein","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055314"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1086\/259394"},{"key":"ref9","first-page":"134","article-title":"Insurance, risk and resource allocation","author":"arrow","year":"1971","journal-title":"Essays in the Theory of Risk-Bearing"}],"event":{"name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2017,8,27]]},"location":"Mauna Lani Resort, HI, USA","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052581\/8062426\/08062752.pdf?arnumber=8062752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:02:46Z","timestamp":1513195366000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8062752\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccta.2017.8062752","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}