{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T14:42:20Z","timestamp":1769265740856,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3726301.3728400","type":"proceedings-article","created":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:16:41Z","timestamp":1750504601000},"page":"70-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Theory to Estimate, Bound, and Manage Systemic Cyber-Risk"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2791-4606","authenticated-orcid":false,"given":"Ranjan","family":"Pal","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1377-1441","authenticated-orcid":false,"given":"Konnie","family":"Duan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3433-5725","authenticated-orcid":false,"given":"Rohan","family":"Sequeira","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Donald\u00a0WK Andrews. 2005. Cross-section regression with common shocks. Econometrica 73 5 (2005) 1551\u20131585.","DOI":"10.1111\/j.1468-0262.2005.00629.x"},{"key":"e_1_3_3_2_3_2","volume-title":"Risk theory: the stochastic basis of insurance","author":"Beard Robert","year":"2013","unstructured":"Robert Beard. 2013. Risk theory: the stochastic basis of insurance. Vol.\u00a020. Springer Science & Business Media."},{"key":"e_1_3_3_2_4_2","series-title":"Encyclopedia of Mathematics and its Applications","volume-title":"Regular variation","author":"Bingham Nicholas\u00a0H","year":"1989","unstructured":"Nicholas\u00a0H Bingham, Charles\u00a0M Goldie, and Jef\u00a0L Teugels. 1989. Regular variation. Number\u00a027 in Encyclopedia of Mathematics and its Applications. Cambridge university press."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Daren\u00a0BH Cline. 1994. Intermediate regular and \u03a0 variation. Proceedings of the London Mathematical Society 3 3 (1994) 594\u2013616.","DOI":"10.1112\/plms\/s3-68.3.594"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Hengxin Cui Ken\u00a0Seng Tan and Fan Yang. 2021. Diversification in catastrophe insurance markets. ASTIN Bulletin: The Journal of the IAA 51 3 (2021) 753\u2013778.","DOI":"10.1017\/asb.2021.18"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00019"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Anirban DasGupta and Anirban DasGupta. 2008. Saddlepoint Approximations. Asymptotic Theory of Statistics and Probability (2008) 203\u2013224.","DOI":"10.1007\/978-0-387-75971-5_14"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Denis Denisov Serguei Foss and Dmitry Korshunov. 2010. Asymptotics of randomly stopped sums in the presence of heavy tails. Bernoulli (2010) 971\u2013994.","DOI":"10.3150\/10-BEJ251"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Martin Eling Michael McShane and Trung Nguyen. 2021. Cyber risk management: History and future research directions. Risk Management and Insurance Review 24 1 (2021) 93\u2013125.","DOI":"10.1111\/rmir.12169"},{"key":"e_1_3_3_2_11_2","volume-title":"Modelling extremal events: for insurance and finance","author":"Embrechts Paul","year":"2013","unstructured":"Paul Embrechts, Claudia Kl\u00fcppelberg, and Thomas Mikosch. 2013. Modelling extremal events: for insurance and finance. Vol.\u00a033. Springer Science & Business Media."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Paul Embrechts Johanna Ne\u0161lehov\u00e1 and Mario\u00a0V W\u00fcthrich. 2009. Additivity properties for Value-at-Risk under Archimedean dependence and heavy-tailedness. Insurance: Mathematics and Economics 44 2 (2009) 164\u2013169.","DOI":"10.1016\/j.insmatheco.2008.08.001"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Maurice\u00a0J Frank Roger\u00a0B Nelsen and Berthold Schweizer. 1987. Best-possible bounds for the distribution of a sum\u2014a problem of Kolmogorov. Probability theory and related fields 74 2 (1987) 199\u2013211.","DOI":"10.1007\/BF00569989"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Torben Hagerup and Christine R\u00fcb. 1990. A guided tour of Chernoff bounds. Information processing letters 33 6 (1990) 305\u2013308.","DOI":"10.1016\/0020-0190(90)90214-I"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"A. Hoffman. 2007. Internalizing Externalities of Loss Prevention Through Insurance Monopoly. Geneva Risk and Insurance Review 32 (2007).","DOI":"10.1007\/s10713-007-0004-2"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16877-7"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Rustam Ibragimov. 2009. Portfolio diversification and value at risk under thick-tailedness. Quantitative Finance 9 5 (2009) 565\u2013580.","DOI":"10.1080\/14697680802629384"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Rustam Ibragimov and Johan Walden. 2007. The limits of diversification when losses may be large. Journal of banking & finance 31 8 (2007) 2551\u20132569.","DOI":"10.1016\/j.jbankfin.2006.11.014"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Rustam Ibragimov and Johan Walden. 2011. Value at risk and efficiency under dependence and heavy-tailedness: models with common shocks. Annals of Finance 7 3 (2011) 285\u2013318.","DOI":"10.1007\/s10436-010-0166-2"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062066"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Li Liu. 2009. Precise large deviations for dependent random variables with heavy tails. Statistics & Probability Letters 79 9 (2009) 1290\u20131298.","DOI":"10.1016\/j.spl.2009.02.001"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Fotis Loukissas. 2012. Precise large deviations for long-tailed distributions. Journal of Theoretical Probability 25 (2012) 913\u2013924.","DOI":"10.1007\/s10959-011-0367-2"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Dawei Lu. 2012. Lower bounds of large deviation for sums of long-tailed claims in a multi-risk model. Statistics & Probability Letters 82 7 (2012) 1242\u20131250.","DOI":"10.1016\/j.spl.2012.03.020"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Angelica Marotta Fabio Martinelli Stefano Nanni Albina Orlando and Artsiom Yautsiukhin. 2017. Cyber-insurance survey. Computer Science Review 24 (2017) 35\u201361.","DOI":"10.1016\/j.cosrev.2017.01.001"},{"key":"e_1_3_3_2_25_2","volume-title":"Inequalities: Theory of Majorization and its Applications","author":"Marshall Albert\u00a0W","year":"1979","unstructured":"Albert\u00a0W Marshall, Ingram Olkin, and Barry\u00a0C Arnold. 1979. Inequalities: Theory of Majorization and its Applications. Vol.\u00a0143. Springer, New York."},{"key":"e_1_3_3_2_26_2","volume-title":"Quantitative risk management: concepts, techniques and tools-revised edition","author":"McNeil Alexander\u00a0J","year":"2015","unstructured":"Alexander\u00a0J McNeil, R\u00fcdiger Frey, and Paul Embrechts. 2015. Quantitative risk management: concepts, techniques and tools-revised edition. Princeton university press."},{"key":"e_1_3_3_2_27_2","volume-title":"Workshop on the Economics of Information Security (WEIS)","author":"Naghizadeh Parinaz","year":"2014","unstructured":"Parinaz Naghizadeh and Mingyan Liu. 2014. Voluntary participation in cyber-insurance markets. In Workshop on the Economics of Information Security (WEIS)."},{"key":"e_1_3_3_2_28_2","volume-title":"An introduction to copulas","author":"Nelsen Roger\u00a0B","year":"2007","unstructured":"Roger\u00a0B Nelsen. 2007. An introduction to copulas. Springer Science & Business Media."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Kai\u00a0W Ng Qihe Tang Jia-An Yan and Hailiang Yang. 2004. Precise large deviations for sums of random variables with consistently varying tails. Journal of Applied Probability 41 1 (2004) 93\u2013107.","DOI":"10.1239\/jap\/1077134670"},{"key":"e_1_3_3_2_30_2","volume-title":"WEIS","year":"2009","unstructured":"N.Shetty, G.Schwarz, M.Feleghyazi, and J.Walrand. 2009. Competitive Cyber-Insurance and Internet Security. In WEIS."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.79"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_12"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847944"},{"key":"e_1_3_3_2_34_2","unstructured":"Ranjan Pal Leana Golubchik Konstantinos Psounis and Pan Hui. 2017. Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets. IEEE Transactions on Dependable and Secure Computing (2017)."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Ranjan Pal Leana Golubchik Konstantinos Psounis and Pan Hui. 2018. Improving Cyber-Security via Profitable Insurance Markets. ACM SIGMETRICS Performance Evaluation Review 45 4 (2018) 7\u201315.","DOI":"10.1145\/3273996.3273999"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Ranjan Pal Ziyuan Huang Sergey Lototsky Xinlong Yin Mingyan Liu Jon Crowcroft Nishanth Sastry Swades De and Bodhibrata Nag. 2021. Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-) Insurers and Likes. ACM Transactions on Management Information Systems (TMIS) 12 2 (2021) 1\u201336.","DOI":"10.1145\/3446635"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/WSC48552.2020.9384103"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Ranjan Pal Ziyuan Huang Xinlong Yin Sergey Lototsky Swades De Sasu Tarkoma Mingyan Liu Jon Crowcroft and Nishanth Sastry. 2020. Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re) Insurers and Likes. IEEE Internet of Things Journal 8 9 (2020).","DOI":"10.1109\/JIOT.2020.3039254"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Ranjan Pal Peihan Liu Taoan Lu and Ed Hua. 2023. How Hard Is Cyber-risk Management in IT\/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs. ACM Transactions on Cyber-Physical Systems (TCPS) 6 4 (2023) 1\u201331.","DOI":"10.1145\/3568399"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/WSC52266.2021.9715524"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Ranjan Pal Konstantinos Psounis Jon Crowcroft Frank Kelly Pan Hui Sasu Tarkoma Abhishek Kumar John Kelly Aritra Chatterjee Leana Golubchik et\u00a0al. 2020. When Are Cyber Blackouts in Modern Service Networks Likely? A Network Oblivious Theory on Cyber (Re) Insurance Feasibility. ACM Transactions on Management Information Systems (TMIS) 11 2 (2020) 1\u201338.","DOI":"10.1145\/3386159"},{"key":"e_1_3_3_2_42_2","unstructured":"Ranjan Pal and Rohan Sequeira. 2024. How Hard is it to Estimate Systemic Enterprise Cyber-Risk. To Appear in Proceedings of the Winter Simulation Confernce (2024)."},{"key":"e_1_3_3_2_43_2","unstructured":"Ranjan Pal Rohan\u00a0Xavier Sequeira Xinlong Yin Sander Zeijlemaker and Vineeth Kotala. 2023. How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk Exposure in their Industrial IoT Network? ACM Transactions on Management Information Systems (2023)."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.5555\/3643142.3643212"},{"key":"e_1_3_3_2_45_2","volume-title":"Extreme values, regular variation, and point processes","author":"Resnick Sidney\u00a0I","year":"2008","unstructured":"Sidney\u00a0I Resnick. 2008. Extreme values, regular variation, and point processes. Vol.\u00a04. Springer Science & Business Media."},{"key":"e_1_3_3_2_46_2","volume-title":"Principles of mathematical analysis","author":"Rudin Walter","year":"1964","unstructured":"Walter Rudin et\u00a0al. 1964. Principles of mathematical analysis. Vol.\u00a03. McGraw-hill New York."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"AJ Stam. 1973. Regular variation of the tail of a subordinated probability distribution. Advances in Applied Probability 5 2 (1973) 308\u2013327.","DOI":"10.2307\/1426038"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Shijie Wang and Wensheng Wang. 2007. Precise large deviations for sums of random variables with consistently varying tails in multi-risk models. Journal of Applied Probability 44 4 (2007) 889\u2013900.","DOI":"10.1239\/jap\/1197908812"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13665.001.0001"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00053"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Z. Yang and J.\u00a0C.\u00a0S. Lui. 2014. Security Adoption and Influence of Cyber-Insurance Markets in Heterogenous Networks. Performance Evaluation 74 (2014).","DOI":"10.1016\/j.peva.2013.10.003"}],"event":{"name":"SIGSIM-PADS '25: 39th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation","location":"Santa Fe USA","acronym":"SIGSIM-PADS '25","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 39th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726301.3728400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T15:34:32Z","timestamp":1750779272000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726301.3728400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":50,"alternative-id":["10.1145\/3726301.3728400","10.1145\/3726301"],"URL":"https:\/\/doi.org\/10.1145\/3726301.3728400","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]},"assertion":[{"value":"2025-06-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}