Rising rate of cyber criminal activities has caught the attention of everyone spanning industry, academia, federal institutions, and military agencies. The initiative to protect critical resources against future cyber attacks requires security investments complemented with a collaborative effort from every organization. Therefore, a robust CYBersecurity information EXchange (CYBEX) framework is required to facilitate cyber-threat intelligence (CTI) sharing among the participants (firms) to abate the impact of cyber attacks.Since many firms hesitate to participate in the sharing framework, we devise a CYBEX self-coexistence game that is aimed to guide the firms (players) to choose if they are interested to participate or not. The evolutionar...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
Abstract—The initiative to protect against future cyber crimes requires a collaborative effort from ...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
We build a game theory model where the market design is such that one firm invests in security to de...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
In CYBersecurity Information Exchange (CYBEX) framework, Cyber Threat Intelligence (CTI) is shared a...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...
Abstract—The initiative to protect against future cyber crimes requires a collaborative effort from ...
We build a game theory model where the market design is such that one firm invests in security to de...
We build a game theory model where the market design is such that one firm invests in security to de...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
This is an article that was originally published in Journal of Information Systems and Technology Ma...
<p>Information security economics, an emerging and thriving research topic, attempts to address the ...
We build a game theory model where the market design is such that one firm invests in security to de...
Given that Information Technology (IT) security has emerged as an important issue in the last few ye...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
In CYBersecurity Information Exchange (CYBEX) framework, Cyber Threat Intelligence (CTI) is shared a...
Economic agents make rational cybersecurity investment decisions considering the costs and the benef...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
A four period game between two firms and two hackers is analyzed. The firms first defend and the hac...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
One firm invests in security to defend against cyber attacks by two hackers. Each hacker chooses an ...