Author of the publication

The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes.

, , , , , and . CyberSA, page 1-8. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practitioners' Views on Cybersecurity Control Adoption and Effectiveness., , , , , and . ARES, page 91:1-91:10. ACM, (2021)The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes., , , , , and . CyberSA, page 1-8. IEEE, (2020)Sonification for network-security monitoring.. University of Oxford, UK, (2018)British Library, EThOS.Introduction to the Minitrack on International Perspectives for Cybersecurity., , , and . HICSS, page 4838. ScholarSpace, (2023)Future scenarios and challenges for security and privacy., , , and . RTSI, page 1-6. IEEE, (2016)Analysing cyber-insurance claims to design harm-propagation trees., , , , and . CyberSA, page 1-4. IEEE, (2019)A system to calculate Cyber Value-at-Risk., , , , , and . Comput. Secur., (2022)99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms., , and . USENIX Security Symposium, page 2783-2800. USENIX Association, (2022)An Efficient and Decentralized Blockchain-based Commercial Alternative (Full Version)., , , , and . IACR Cryptol. ePrint Arch., (2022)PB-PKI: A Privacy-aware Blockchain-based PKI., and . SECRYPT, page 311-318. SciTePress, (2017)