{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:52:48Z","timestamp":1730213568765,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899442","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T23:18:43Z","timestamp":1574723923000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Insurance and Time-to-Compromise: An Integrated Approach"],"prefix":"10.1109","author":[{"given":"Ganbayar","family":"Uuganbayar","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Artsiom","family":"Yautsiukhin","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.46"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-0-387-73699-0_2","article-title":"The knapsack problem","author":"bartholdi","year":"2008","journal-title":"Building Intuition"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12864"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFTECH.2008.4621683"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36584-8_5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.02.012"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2602945.2602952"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2013.30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566481"},{"key":"ref40","article-title":"A Fundamental Approach to Cyber Risk Analysis","author":"b\u00f6hme","year":"2017","journal-title":"Variance"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566481"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/978-3-642-13869-0_23","article-title":"Can competitive insurers improve network security?","volume":"6101","author":"shetty","year":"0","journal-title":"Proceedings of the 3rd International Conference on Trust and Trustworthy Computing Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.10.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99828-2_14"},{"journal-title":"PartnerRe Survey of Cyber Insurance Market Trends","year":"2017","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_13"},{"key":"ref18","first-page":"1","article-title":"Cyberinsurance as a market-based solution to the problem of cybersecurity: a case study","author":"jay","year":"0","journal-title":"Proc WEIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3106723.3106730"},{"key":"ref28","article-title":"Organizational adoption of cyber insurance instruments in IT security risk management: a modeling approach","volume":"5","author":"bandyopadhyay","year":"0","journal-title":"Proceedings"},{"journal-title":"Cisco Annual Cybersecurity Report","year":"2017","key":"ref4"},{"journal-title":"Cyber\/privacy insurance market survey - 2014","year":"2014","author":"betterley","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cosrev.2017.01.001","article-title":"Cyber-insurance survey","volume":"24","author":"marotta","year":"2017","journal-title":"Computer Science Review"},{"year":"2018","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1993-22-308"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1126\/science.1130992","article-title":"The economics of information security","volume":"314","author":"anderson","year":"2006","journal-title":"Science"},{"key":"ref8","article-title":"Cyber insurance and it security investment: Impact of interdependent risk","author":"ogut","year":"0","journal-title":"Proceedings of the 4th Workshop on the Economics of Information Security"},{"journal-title":"Moore Security economics and the internal market","year":"2008","author":"anderson","key":"ref7"},{"volume":"23","journal-title":"Symantec Internet security Report","year":"2018","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-94-015-7957-5_8","author":"ehrlich","year":"1992","journal-title":"Market Insurance Self-Insurance and Self-Protection Foundations of Insurance Economics chap Economics and Finance"},{"year":"0","key":"ref1"},{"journal-title":"ENISA Incentives and barriers of the cyber insurance market in europe","year":"2012","key":"ref20"},{"journal-title":"Travel insurance through Europe Assistance","year":"0","key":"ref45"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/365181.365229","article-title":"Insurance and the computer industry","volume":"44","author":"bruce","year":"2001","journal-title":"Communications of the ACM"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847944"},{"journal-title":"National Vulnerability Database Version 2 2","year":"0","key":"ref42"},{"key":"ref24","article-title":"Preventing the drop in security investments for noncompetitive cyber-insurance market","author":"martinelli","year":"0","journal-title":"Proceedings of the 12th International Conference on Risks and Security of Internet and Systems (will be appeared in Springer)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"ref23","first-page":"1","article-title":"The evolution of cyberinsurance","author":"majuca","year":"2006","journal-title":"The Computing Research Repository"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.09.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0010-x"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.17"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6967-5_12"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899442.pdf?arnumber=8899442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:33Z","timestamp":1658094933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899442","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}