{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:19:00Z","timestamp":1758709140980,"version":"3.28.0"},"reference-count":63,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/ccta.2018.8511535","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T04:05:14Z","timestamp":1542341114000},"page":"1704-1711","source":"Crossref","is-referenced-by-count":2,"title":["Cyber-Insurance for Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Barreto","sequence":"first","affiliation":[]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[]},{"given":"Galina","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pool Re Tech Rep","article-title":"Pool reinsurance company limited: Annual report 2015","year":"2016","key":"ref39"},{"key":"ref38","first-page":"441","article-title":"British government reinsurance and acts of terrorism: The problems of pool re","volume":"15","author":"brice","year":"1994","journal-title":"U Pa J Int'l Bus L"},{"journal-title":"Uncertain Business Risk Insurance and the Limits of Knowledge","year":"2004","author":"ericson","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/0308514032000073437"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/030437540803300204"},{"key":"ref30","article-title":"Earthquake engineering and insurance: past, present and future","author":"walker","year":"2000","journal-title":"Aon Re Australia)"},{"key":"ref37","article-title":"Why fukushima was preventable","author":"acton","year":"2012","journal-title":"Carnegie endowment for international peace Tech Rep"},{"key":"ref36","article-title":"The general theory of employment, money and interest","volume":"7","author":"keynes","year":"1936","journal-title":"Collected Writings"},{"key":"ref35","volume":"17","author":"beck","year":"1992","journal-title":"Risk Society Towards a New Modernity"},{"journal-title":"Swiss Re Tech Rep","article-title":"Understanding reinsurance: How reinsurers create value and manage risk","year":"2004","key":"ref34"},{"key":"ref60","article-title":"Artificial diversity as maneuvers in a control theoretic moving target defense","author":"rowe","year":"2012","journal-title":"Moving Target Research Symposium"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA.2017.8062752"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12601-2_6"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2012.02.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176996548"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100015681"},{"key":"ref29","first-page":"119","article-title":"Statistical inference using extreme order statistics","author":"pickands","year":"1975","journal-title":"The Annals of Statistics"},{"journal-title":"Wired Magazine","article-title":"Inside the cunning, unprecedented hack of ukraine's power grid","year":"2016","key":"ref2"},{"key":"ref1","article-title":"An unprecedented look at stuxnet, the world's first digital weapon","author":"zetter","year":"2014","journal-title":"Wired Magazine"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jibs.8400324"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/0308514032000073428"},{"key":"ref21","volume":"2","author":"taleb","year":"2007","journal-title":"The Black Swan The Impact of the Highly Improbable"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/10920277.1999.10595797"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2143\/AST.27.1.563210"},{"key":"ref26","volume":"33","author":"embrechts","year":"2013","journal-title":"Modelling Extremal Events for Insurance and Finance"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/S1357321700003251"},{"key":"ref50","first-page":"122","article-title":"How much security is enough to stop a thief?","author":"schechter","year":"2003","journal-title":"Computer Aided Verification"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1086\/259394"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2995272.2995273"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040216"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2310911"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12362"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9134-5"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3055305.3055314"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1322638111"},{"key":"ref52","article-title":"Catching cyber criminals","author":"greene","year":"2006","journal-title":"MIT Technology Review"},{"journal-title":"Critical Infrastructure Protection IV","year":"2014","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1086\/259916"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-6787-2_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2015.14"},{"journal-title":"Tech Rep","article-title":"Cyber insurance: Recent advances, good practices and challenges","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1057\/gpp.2014.19"},{"key":"ref15","article-title":"Cybersecurity market reaches $75 billion in 2015, expected to reach $170 billion by 2020","author":"morgan","year":"2015","journal-title":"Forbes"},{"journal-title":"Insurance Information Institute","article-title":"Insurance industry at a glance","year":"2015","key":"ref16"},{"journal-title":"Tech Rep","article-title":"2015 global cyber impact report","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.7551\/mitpress\/2605.003.0006","article-title":"Markets under stress: The case of extreme event insurance","author":"jaffee","year":"2003","journal-title":"Economics for an Imperfect World Essays in Honor of Joseph E Stiglitz"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2011.01787.x"},{"key":"ref4","article-title":"Roadmap to achieve energy delivery systems cybersecurity","author":"group","year":"2011","journal-title":"Tech Rep"},{"journal-title":"Hackers halt plant operations in watershed cyber attack","year":"2017","author":"finkle","key":"ref3"},{"journal-title":"Infrastructure disruption Internet of things security","year":"2016","author":"fu","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.39"},{"journal-title":"Incentives to support adoption of the cybersecu-rity framework","year":"2013","author":"daniel","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3073731"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfs.2008.09.003"},{"journal-title":"Tech Rep","article-title":"Executive order 13636: Improving critical infrastructure cybersecurity","year":"2013","key":"ref9"},{"journal-title":"LIGHTS OUT A Cyberattack A Nation Unprepared Surviving the Aftermath","year":"2016","author":"koppel","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.7249\/WR1208"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4266(02)00263-7"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.30"},{"journal-title":"Information Sharing","year":"2016","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0155-1_31"},{"key":"ref44","article-title":"Cyber risk: Too big to insure? risk transfer options for a mercurial risk class","author":"eling","year":"2016","journal-title":"Tech Rep"},{"key":"ref43","article-title":"Using cyber-insurance as a risk management strategy: Knowledge gaps and recommendations for further research","author":"t?ndel","year":"2015","journal-title":"Tech Rep"}],"event":{"name":"2018 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2018,8,21]]},"location":"Copenhagen","end":{"date-parts":[[2018,8,24]]}},"container-title":["2018 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8490495\/8511086\/08511535.pdf?arnumber=8511535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T12:36:06Z","timestamp":1720787766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8511535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/ccta.2018.8511535","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}