Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice, vol.40, pp.131-158, 2015. ,
Contagion in cyber security attacks, Journal of the Operational Research Society, vol.68, issue.07, pp.780-791, 2017. ,
Models and measures for correlation in cyber-insurance, WEIS, vol.2, p.3, 2006. ,
Stability of nonlinear hawkes processes. The Annals of Probability, pp.1563-1588, 1996. ,
Power spectra of general shot noises and hawkes point processes with a random excitation, Advances in Applied Probability, vol.34, issue.1, pp.205-222, 2002. ,
Hawkes processes in finance, Market Microstructure and Liquidity, vol.1, issue.01, p.12, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01313838
Lapse risk in life insurance: Correlation and contagion effects among policyholdersâ behaviors, Insurance: Mathematics and Economics, vol.71, issue.3, pp.317-331, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01282601
Population viewpoint on Hawkes processes, vol.48, p.27, 1920. ,
URL : https://hal.archives-ouvertes.fr/hal-01149752
Modeling cyber-insurance: Towards a unifying framework, WEIS, 2010. ,
An introduction to the theory of point processes: volume II: general theory and structure, vol.4, 2007. ,
Affine point processes and portfolio credit risk, SIAM Journal on Financial Mathematics, vol.1, issue.1, p.3, 2010. ,
Hype and heavy tails: A closer look at data breaches, Journal of Cybersecurity, vol.2, issue.1, pp.3-14, 2016. ,
Data breaches: Goodness of fit, pricing, and risk measurement, Insurance: mathematics and economics, vol.75, p.25, 2017. ,
Multivariate hawkes processes: an application to financial data, Journal of Applied Probability, vol.48, issue.3, pp.367-378, 2011. ,
What do we know about cyber risk and cyber risk insurance? The Journal of Risk Finance, 2016. ,
Cyber claim analysis through generalized pareto regression trees with applications to insurance, vol.5, p.25 ,
URL : https://hal.archives-ouvertes.fr/hal-02118080
Pricing of cyber insurance contracts in a network model, ASTIN Bulletin: The Journal of the IAA, vol.48, issue.3, pp.1175-1218, 2018. ,
Spatial point processes and the projection method, and Out of Equilibrium, vol.2, p.15, 2008. ,
A bivariate hawkes process for interest rate modeling, Economic Modelling, vol.57, issue.3, pp.180-196, 2016. ,
Spectra of some self-exciting and mutually exciting point processes, Biometrika, vol.58, issue.1, pp.83-90, 1971. ,
Critical reflexivity in financial markets: a hawkes process analysis, The European Physical Journal B, vol.86, issue.10, p.22, 2013. ,
Copula-based actuarial model for pricing cyber-insurance policies. Insurance markets and companies: analyses and actuarial computations, vol.2, p.3, 2011. ,
Aggregating vulnerability metrics in enterprise networks using attack graphs, Journal of Computer Security, vol.21, issue.4, pp.561-597, 2013. ,
Analyzing ponemon cost of data breach, Data Driven Security, vol.11, issue.5, 2014. ,
Market activity and price impact throughout time scales, 2015. ,
Security games with market insurance, International Conference on Decision and Game Theory for Security, pp.117-130, 2011. ,
A bivariate shot noise self-exciting process for insurance, Insurance: Mathematics and Economics, vol.53, issue.3, pp.524-532, 2013. ,
Cyber-insurance survey, Computer Science Review, vol.24, issue.2, pp.35-61, 2017. ,
Heavy-tailed distribution of cyberrisks, The European Physical Journal B, vol.75, issue.3, pp.357-364, 2010. ,
Measuring security risk of networks using attack graphs, International Journal of Next-Generation Computing, vol.1, issue.1, pp.135-147, 2010. ,
Maximum likelihood estimation of hawkes' self-exciting point processes, Annals of the Institute of Statistical Mathematics, vol.31, issue.1, pp.145-155, 1979. ,
Modeling and predicting extreme cyber attack rates via marked point processes, Journal of Applied Statistics, vol.44, issue.14, p.3, 2017. ,
Estimating the costs of consumer-facing cybercrime: A tailored instrument and representative data for six eu countries, Workshop on the Economics of Information Security (WEIS), 2016. ,
An adversarial risk analysis framework for cybersecurity, Risk Analysis, issue.2, 2019. ,
A tutorial on hawkes processes for events in social media, 2017. ,
Examining the costs and causes of cyber incidents, Journal of Cybersecurity, vol.2, issue.2, p.25, 2016. ,
Utility implementation for cyber risk insurance modeling, Proceedings of the World Congress on Engineering, vol.1, 2011. ,
Risk processes with nonstationary hawkes claims arrivals, Methodology and Computing in Applied Probability, vol.12, issue.3, p.3, 2010. ,
Integrated framework for information security investment and cyber insurance, Pacific-Basin Finance Journal, vol.57, issue.2, p.101173, 2019. ,
Cybersecurity insurance: Modeling and pricing, North American Actuarial Journal, vol.23, issue.2, p.35, 2019. ,