Author:
Leong Yin-Yee,Chen Yen-Chih
Publisher
Springer Science and Business Media LLC
Subject
Economics and Econometrics,Finance,General Business, Management and Accounting,Accounting
Reference37 articles.
1. AIG. 2018. Getting hacked: IoT and beyond. https://www.aig.com/content/dam/aig/america-canada/us/documents/innovative-tech/getting-hacked-iot-and-beyond.pdf. Accessed 15 Nov 2019.
2. Anchen, J. 2017. Cyber: Getting to grips with a complex risk. Swiss Re Sigma 1: 1–38. https://www.swissre.com/institute/research/sigma-research/sigma-2017-01.html. Accessed 11 July 2019.
3. Auer, M. 2008. Operationelles risikomanagement bei finanzinstituten: Risiken identifizieren, analysieren und steuern. Weinheim: Wiley-VCH.
4. Biener, C., M. Eling, and J.H. Wirfs. 2015. Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40 (1): 131–158.
5. Bruschi, D., L. Martignoni, and M. Monga. 2007. Code normalization for self-mutating malware. IEEE Security and Privacy 5 (2): 46–54.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献