Author of the publication

Designing cyber insurance policies in the presence of security interdependence.

, , and . NetEcon@EC, page 7:1-7:6. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Control Barrier Functions for Sampled-Data Systems., , and . IEEE Control. Syst. Lett., (2024)Provision of non-excludable public goods on networks: From equilibrium to centrality measures., and . Allerton, page 58-65. IEEE, (2015)Embracing risk dependency in designing cyber-insurance contracts., , and . Allerton, page 926-933. IEEE, (2017)Incentive Mechanisms for Strategic Classification and Regression Problems., , , , and . EC, page 760-790. ACM, (2022)Adversarial Contract Design for Private Data Commercialization., and . EC, page 681-699. ACM, (2019)Designing Cyber Insurance Policies: Mitigating Moral Hazard Through Security Pre-Screening., , and . GAMENETS, volume 212 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 63-73. Springer, (2017)Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting., , , , and . CDC, page 5374-5379. IEEE, (2019)Safe Control Using High-Order Measurement Robust Control Barrier Functions., , and . ACC, page 4148-4154. IEEE, (2023)Budget balance or voluntary participation? Incentivizing investments in interdependent security games., and . Allerton, page 1102-1109. IEEE, (2014)On the uniqueness and stability of equilibria of network games., and . Allerton, page 280-286. IEEE, (2017)