Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
DOI10.1016/J.EJOR.2020.09.013zbMATH Open1487.90663OpenAlexW3088835138MaRDI QIDQ2029985FDOQ2029985
Authors: Minjiao Zhang, Jomon Aliyas Paul
Publication date: 4 June 2021
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2020.09.013
Recommendations
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- Modeling the effect of spending on cyber security by using surplus process
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
- A Tullock-contest-based approach for cyber security investments
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
decision analysisstochastic programmingexternalitycybersecuritysafeguardssocial costintelligence investment
Applications of mathematical programming (90C90) Decision theory (91B06) Stochastic programming (90C15) Theory of languages and software systems (knowledge-based systems, expert systems, etc.) for artificial intelligence (68T35)
Cites Work
- Optimal allocation of resources in airport security: profiling vs. screening
- Supply chain efficiency and security: coordination for collaborative investment in technology
- Optimal selection of IT security safeguards from an existing knowledge base
- Espionage and the optimal standard of the customs-trade partnership against terrorism (C-TPAT) program in maritime security
- A framework for secure IT operations in an uncertain and changing environment
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
Cited In (6)
- Title not available (Why is that?)
- Structural models for fog computing based Internet of things architectures with insurance and risk management applications
- Role of intelligence inputs in defending against cyber warfare and cyberterrorism
- Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
- Modeling the effect of spending on cyber security by using surplus process
- Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach
Uses Software
This page was built for publication: Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2029985)