Decentral and incentivized federated learning frameworks: A systematic literature review

L Witt, M Heyer, K Toyoda, W Samek… - IEEE Internet of Things …, 2022‏ - ieeexplore.ieee.org
The advent of federated learning (FL) has sparked a new paradigm of parallel and
confidential decentralized machine learning (ML) with the potential of utilizing the …

What do we know about cyber risk and cyber risk insurance?

M Eling, W Schnell - The Journal of Risk Finance, 2016‏ - emerald.com
Purpose This paper aims to provide an overview of the main research topics in the emerging
fields of cyber risk and cyber risk insurance. The paper also illustrates future research …

[PDF][PDF] Real-Time Cybersecurity threat detection using machine learning and big data analytics: A comprehensive approach

KDO Ofoegbu, OS Osundare, CS Ike… - Computer Science & …, 2024‏ - researchgate.net
Ofoegbu, Osundare, Ike, Fakeyede, & Ige, P. 478-501 Page 479 unprecedented speeds,
enabling swift identification and response to security breaches. The comprehensive …

[PDF][PDF] Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols

KDO Ofoegbu, OS Osundare, CS Ike… - Computer Science & …, 2024‏ - researchgate.net
Ofoegbu, Osundare, Ike, Fakeyede, & Ige, P. 2083-2106 Page 2084 the development of
more effective threat detection systems and predictive models that enhance an …

Cyber risk management: History and future research directions

M Eling, M McShane, T Nguyen - Risk Management and …, 2021‏ - Wiley Online Library
Cybersecurity research started in the late 1960s and has continuously evolved under
different names such as computer security and information security. This article briefly …

What are the actual costs of cyber risk events?

M Eling, J Wirfs - European Journal of Operational Research, 2019‏ - Elsevier
Cyber risks are high on the business agenda of every company, but they are difficult to
assess due to the absence of reliable data and thorough analyses. This paper is the first to …

Modeling and predicting cyber hacking breaches

M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018‏ - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …

SoK: Quantifying cyber risk

DW Woods, R Böhme - 2021 IEEE Symposium on Security and …, 2021‏ - ieeexplore.ieee.org
This paper introduces a causal model inspired by structural equation modeling that explains
cyber risk outcomes in terms of latent factors measured using reflexive indicators. First, we …

Cyber claim analysis using Generalized Pareto regression trees with applications to insurance

S Farkas, O Lopez, M Thomas - Insurance: Mathematics and Economics, 2021‏ - Elsevier
With the rise of the cyber insurance market, there is a need for better quantification of the
economic impact of this risk and its rapid evolution. Due to the heterogeneity of cyber claims …

The double-edged sword of big data in organizational and management research: A review of opportunities and risks

R Wenzel, N Van Quaquebeke - Organizational Research …, 2018‏ - journals.sagepub.com
While many disciplines embrace the possibilities that Big Data present for advancing
scholarship and practice, organizational and management research has yet to realize Big …