{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:00:29Z","timestamp":1730304029805,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/vtcfall.2018.8690762","type":"proceedings-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T22:56:28Z","timestamp":1555368988000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Competitive Security Pricing in Cyber-Insurance Market: A Game-Theoretic Analysis"],"prefix":"10.1109","author":[{"given":"Shaohan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Insurers tap cyber security ratings to limit liabilities","year":"0","author":"times","key":"ref4"},{"key":"ref3","first-page":"1","author":"pal","year":"2013","journal-title":"On a way to improve cyber-insurer profits when a security vendor becomes the cyber-insurer"},{"journal-title":"Summary of whats known about convergence in concave games","year":"2009","author":"shi","key":"ref10"},{"key":"ref6","article-title":"Security pricing as enabler of cyber-insurance a first look at differentiated pricing markets","author":"pal","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377068"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659059"},{"journal-title":"Gershgorin circle theorem","year":"0","author":"gershgorin","key":"ref8"},{"key":"ref7","volume":"3","author":"osborne","year":"2004","journal-title":"An Introduction to Game Theory"},{"key":"ref2","first-page":"1494","author":"lelarge","year":"2009","journal-title":"Economic incentives to increase security in the internet The case for insurance"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2307\/1911749"},{"key":"ref1","first-page":"68","author":"anderson","year":"2007","journal-title":"Information Security Economics - and Beyond"}],"event":{"name":"2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)","start":{"date-parts":[[2018,8,27]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2018,8,30]]}},"container-title":["2018 IEEE 88th Vehicular Technology Conference (VTC-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672788\/8690547\/08690762.pdf?arnumber=8690762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T22:08:03Z","timestamp":1592518083000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8690762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2018.8690762","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}