Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
From MaRDI portal
Publication:2029985
Recommendations
- Cybersecurity investments with nonlinear budget constraints: analysis of the marginal expected utilities
- Modeling the effect of spending on cyber security by using surplus process
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
- A Tullock-contest-based approach for cyber security investments
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
Cites work
- A framework for secure IT operations in an uncertain and changing environment
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- Espionage and the optimal standard of the customs-trade partnership against terrorism (C-TPAT) program in maritime security
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
- Optimal allocation of resources in airport security: profiling vs. screening
- Optimal selection of IT security safeguards from an existing knowledge base
- Supply chain efficiency and security: coordination for collaborative investment in technology
Cited in
(6)- scientific article; zbMATH DE number 6613302 (Why is no real title available?)
- Modeling the effect of spending on cyber security by using surplus process
- Role of intelligence inputs in defending against cyber warfare and cyberterrorism
- Structural models for fog computing based Internet of things architectures with insurance and risk management applications
- Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data
- Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach
This page was built for publication: Decision support model for cybersecurity risk planning: a two-stage stochastic programming framework featuring firms, government, and attacker
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2029985)