Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 69 tok/s
Gemini 2.5 Pro 58 tok/s Pro
GPT-5 Medium 32 tok/s Pro
GPT-5 High 29 tok/s Pro
GPT-4o 108 tok/s Pro
Kimi K2 198 tok/s Pro
GPT OSS 120B 461 tok/s Pro
Claude Sonnet 4.5 33 tok/s Pro
2000 character limit reached

Cyber risk modeling using a two-phase Hawkes process with external excitation (2311.15701v1)

Published 27 Nov 2023 in math.ST and stat.TH

Abstract: With the growing digital transformation of the worldwide economy, cyber risk has become a major issue. As 1 % of the world's GDP (around $1,000 billion) is allegedly lost to cybercrime every year, IT systems continue to get increasingly interconnected, making them vulnerable to accumulation phenomena that undermine the pooling mechanism of insurance. As highlighted in the literature, Hawkes processes appear to be suitable models to capture contagion phenomena and clustering features of cyber events. This paper extends the standard Hawkes modeling of cyber risk frequency by adding external shocks, modelled by the publication of cyber vulnerabilities that are deemed to increase the likelihood of attacks in the short term. The aim of the proposed model is to provide a better quantification of contagion effects since, while the standard Hawkes model allocates all the clustering phenomena to self-excitation, our model allows to capture the external common factors that may explain part of the systemic pattern. We propose a Hawkes model with two kernels, one for the endogenous factor (the contagion from other cyber events) and one for the exogenous component (cyber vulnerability publications). We use parametric exponential specifications for both the internal and exogenous intensity kernels, and we compare different methods to tackle the inference problem based on public datasets containing features of cyber attacks found in the Hackmageddon database and cyber vulnerabilities from the Known Exploited Vulnerability database and the National Vulnerability Dataset. By refining the external excitation database selection, the degree of endogeneity of the model is nearly halved. We illustrate our model with simulations and discuss the impact of taking into account the external factor driven by vulnerabilities. Once an attack has occurred, response measures are implemented to limit the effects of an attack. These measures include patching vulnerabilities and reducing the attack's contagion. We use an augmented version of the model by adding a second phase modeling a reduction in the contagion pattern from the remediation measures. Based on this model, we explore various scenarios and quantify the effect of mitigation measures of an insurance company that aims to mitigate the effects of a cyber pandemic in its insured portfolio.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (26)
  1. Baldwin A, Gheyas I, Ioannidis C, et al (2017) Contagion in cyber security attacks. Journal of the Operational Research Society 68(7):780–791 Bessy-Roland et al [2020] Bessy-Roland Y, Boumezoued A, Hillairet C (2020) Multivariate Hawkes process for cyber insurance. Annals of Actuarial Science, 15(1), 14-39 URL https://hal.archives-ouvertes.fr/hal-02546343/documenta Biener et al [2015] Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Bessy-Roland Y, Boumezoued A, Hillairet C (2020) Multivariate Hawkes process for cyber insurance. Annals of Actuarial Science, 15(1), 14-39 URL https://hal.archives-ouvertes.fr/hal-02546343/documenta Biener et al [2015] Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  2. Bessy-Roland Y, Boumezoued A, Hillairet C (2020) Multivariate Hawkes process for cyber insurance. Annals of Actuarial Science, 15(1), 14-39 URL https://hal.archives-ouvertes.fr/hal-02546343/documenta Biener et al [2015] Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  3. Biener C, Eling M, Wirfs JH (2015) Insurability of cyber risk: An empirical analysis. The Geneva Papers on Risk and Insurance-Issues and Practice 40(1):131–158 Boumezoued [2016] Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  4. Boumezoued A (2016) Population viewpoint on Hawkes processes. Advances in Applied Probability 48(2):463–480 Boyd et al [2023] Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  5. Boyd A, Chang Y, Mandt S, et al (2023) Inference for mark-censored temporal point processes. Uncertainty in Artificial Intelligence pp 226–236 Brachetta et al [2022] Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  6. Brachetta M, Callegaro G, Ceci C, et al (2022) Optimal reinsurance via BSDEs in a partially observable contagion model with jump clusters. arXiv preprint arXiv:220705489 To appear in Finance and Statistics: https://wwwspringercom/journal/780/updates/19991928 Chen et al [2021] Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  7. Chen Z, Dassios A, Kuan V, et al (2021) A two-phase dynamic contagion model for COVID-19. Results in Physics 26:104264 CISA [2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog] CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  8. CISA (2023 : https://www.cisa.gov/known-exploited-vulnerabilities-catalog) Kev. URL https://www.cisa.gov/known-exploited-vulnerabilities-catalog Dassios and Zhao [2011] Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  9. Dassios A, Zhao H (2011) A dynamic contagion process. Advances in applied probability 43(3):814–846 Eling and Schnell [2020] Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  10. Eling M, Schnell W (2020) Capital requirements for cyber risk and cyber risk insurance: An analysis of Solvency II, the US risk-based capital standards, and the Swiss Solvency Test. North American Actuarial Journal 24(3):370–392 Fahrenwaldt et al [2018] Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  11. Fahrenwaldt MA, Weber S, Weske K (2018) Pricing of cyber insurance contracts in a network model. ASTIN Bulletin: The Journal of the IAA 48(3):1175–1218 Farkas et al [2021] Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  12. Farkas S, Lopez O, Thomas M (2021) Cyber claim analysis using Generalized Pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98:92–105 Garcia and Kurtz [2008] Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  13. Garcia NL, Kurtz TG (2008) Spatial point processes and the projection method. In and Out of Equilibrium 2 pp 271–298 Hardiman and Bouchaud [2014] Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  14. Hardiman SJ, Bouchaud JP (2014) Branching-ratio approximation for the self-exciting Hawkes process. Physical Review E 90(6):062807 Hillairet and Lopez [2021] Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  15. Hillairet C, Lopez O (2021) Propagation of cyber incidents in an insurance portfolio: counting processes combined with compartmental epidemiological models. Scandinavian Actuarial Journal pp 1–24 NVD [2023 : https://nvd.nist.gov/general] NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  16. NVD (2023 : https://nvd.nist.gov/general) Nvd. URL https://nvd.nist.gov/general Ogata [1981] Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  17. Ogata Y (1981) On Lewis’ simulation method for point processes. IEEE transactions on information theory 27(1):23–31 Passeri [2023 : https://www.hackmageddon.com/] Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  18. Passeri P (2023 : https://www.hackmageddon.com/) Hackmageddon. URL https://www.hackmageddon.com/ Peng et al [2017] Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  19. Peng C, Xu M, Xu S, et al (2017) Modeling and predicting extreme cyber attack rates via marked point processes. Journal of Applied Statistics 44(14):2534–2563 Rambaldi et al [2015] Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  20. Rambaldi M, Pennesi P, Lillo F (2015) Modeling foreign exchange market activity around macroeconomic news: Hawkes-process approach. Physical Review E 91(1):012819 Rambaldi et al [2018] Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  21. Rambaldi M, Filimonov V, Lillo F (2018) Detection of intensity bursts using Hawkes processes: An application to high-frequency financial data. Physical Review E 97(3):032318 Shelton et al [2018] Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  22. Shelton C, Qin Z, Shetty C (2018) Hawkes process inference with missing data. Proceedings of the AAAI Conference on Artificial Intelligence 32(1) Stabile and Torrisi [2010] Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  23. Stabile G, Torrisi GL (2010) Risk processes with non-stationary Hawkes claims arrivals. Methodology and Computing in Applied Probability 12:415–429 Zeller and Scherer [2022] Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  24. Zeller G, Scherer M (2022) A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12(1):33–85 Zeller and Scherer [2023] Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  25. Zeller G, Scherer MA (2023) Is accumulation risk in cyber systematically underestimated? Available at SSRN 4353098 Zhang et al [2015] Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206 Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206
  26. Zhang S, Ou X, Caragea D (2015) Predicting cyber risks through national vulnerability database. Information Security Journal: A Global Perspective 24(4-6):194–206

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.