Cargando…
The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed cost...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
John Wiley and Sons Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9543271/ https://www.ncbi.nlm.nih.gov/pubmed/33960506 http://dx.doi.org/10.1111/risa.13732 |