The Economics of Information Security, Science, vol.314, issue.5799, pp.610-613, 2006. ,
DOI : 10.1126/science.1130992
Towards better definitions and measures of Internet security, Proc. Workshop on Large-Scale-Network Security and Deployment Obstacles, 2003. ,
Deworming the internet Available at SSRN:http://ssrn, Texas Law Review, vol.83, issue.1, 2004. ,
Cyber-insurance revisited, Proc. of Workshop on the Economics of Information Security (WEIS), 2005. ,
Models and measures for correlation in cyber-insurance ,
Pricing security, Proc. CERT Information Survivability Workshop, pp.24-26, 2000. ,
Modeling adoptability of secure BGP protocols, Proc. ACM Sigcomm 06, 2006. ,
Firewalls and Internet Security: Repelling the Wily Hacker, 2003. ,
Software diversity for information security, Proc. WEIS 2005, 2005. ,
The design philosophy of the DARPA Internet protocols, Proc. ACM Sigcomm 88, 1988. ,
Tussle in cyberspace: defining tomorrow's internet, Proc. ACM Sigcomm 02, 2002. ,
Network resilience: exploring cascading failures within BGP, Proc. 40th Annual Allerton Conference on Communications, Computing and Control, 2002. ,
The "robust yet fragile" nature of the Internet, Proc. Nat. Acad. Sciences, 2005. ,
DOI : 10.1073/pnas.0501426102
Market Insurance, Self-Insurance, and Self-Protection, Journal of Political Economy, vol.80, issue.4, pp.623-648, 1972. ,
DOI : 10.1086/259916
The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., 2005. ,
DOI : 10.1109/INFCOM.2005.1498374
The Economics of Risk and Time, 2004. ,
The economics of layered networks, Internet Economics, 1997. ,
Managing Cybersecurity Resources, 2005. ,
Internalizing externalities of loss prevention through insurance monopoly, Proc. Annual Meeting of American Risk and Insurance Association, 2006. ,
Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004. ,
DOI : 10.1109/SECPRI.2004.1301325
Network dimensioning, service costing, and pricing in a packet switched environment, Telecommunications Policy, pp.391-412, 2004. ,
Algorithms for interdependent security games, Advances in Neural Information Processing Systems, 2004. ,
The economic case for cyberinsurance, Securing Privacy in the Internet Age, 2005. ,
Cyberinsurance as a market-based solution to the problem of cybersecurity:a case study, Proc. WEIS 2005, 2005. ,
Research areas in computer communications, Computer Comm. Review, v, vol.4, issue.3, 1974. ,
Interdependent security: the case of identical agents, Journal of Risk and Uncertainty, vol.26, issue.2, pp.231-249, 2003. ,
DOI : 10.3386/w8871
Endorsments, licensing, and insurance for distributed systems services, Proc. 2nd ACM Conf. Computer and Comm. Security (CCS), 1994. ,
DOI : 10.3998/3336451.0001.114
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.1406
Pricing the Internet, Public Access to the Internet, 1995. ,
The evolution of cyberinsurance, Information Systems Frontier, 2005. ,
Non-Life Insurance Mathematics: An Introduction with Stochastic Processes, 2006. ,
DOI : 10.1007/978-3-540-88233-6
Aspects of Rational Insurance Purchasing, Journal of Political Economy, vol.76, issue.4, Part 1, pp.553-568, 1968. ,
DOI : 10.1086/259427
Economics, Psychology, and Sociology of Security, Proc. Financial Cryptography LNCS #2742, 2003. ,
DOI : 10.1007/978-3-540-45126-6_13
Bootstrapping the adoption of Internet security protocols, Workshop Economics Info. Sec, 2006. ,
The top speed of flash worms, Proc. ACM Workshop Rapid Malcode WORM'04, 2004. ,
Quantitatively differentiating system security, Workshop Economics Info. Sec, 2002. ,
Insurance and the computer industry, Communications of the ACM, vol.44, issue.3, 2001. ,
DOI : 10.1145/365181.365229
Computer Security, Proc. WEIS 2002, 2002. ,
DOI : 10.1002/9781119183631.ch8
Pricing in computer networks, ACM SIGCOMM Computer Communication Review, vol.26, issue.2, pp.19-43, 1996. ,
DOI : 10.1145/231699.231703
The Economics of Information Technology, 2004. ,
DOI : 10.1017/CBO9780511754166
On the Race of Worms, Alerts, and Patches, Proc. ACM Workshop on Rapid Malcode WORM05, 2005. ,
DOI : 10.1109/TNET.2007.909678
A worst-case worm See web site for opinion by S, Proc. 3rd Workshop Economics Info. Sec, 2004. ,
Code red worm propagation modeling and analysis, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586130
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3262
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche, 2004. ,
BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399 ,