Next Article in Journal
The Interaction of Borrower and Loan Characteristics in Predicting Risks of Subprime Automobile Loans
Next Article in Special Issue
Numerical Ruin Probability in the Dual Risk Model with Risk-Free Investments
Previous Article in Journal
A Quantum-Type Approach to Non-Life Insurance Risk Modelling
Previous Article in Special Issue
Moments of Compound Renewal Sums with Dependent Risks Using Mixing Exponential Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model

by
Nadezhda Gribkova
1 and
Ričardas Zitikis
2,*
1
Faculty of Mathematics and Mechanics, St. Petersburg State University, St. Petersburg 199034, Russia
2
School of Mathematical and Statistical Sciences, Western University, London, ON N6A 5B7, Canada
*
Author to whom correspondence should be addressed.
Risks 2018, 6(3), 100; https://doi.org/10.3390/risks6030100
Submission received: 28 August 2018 / Revised: 10 September 2018 / Accepted: 10 September 2018 / Published: 14 September 2018
(This article belongs to the Special Issue Risk, Ruin and Survival: Decision Making in Insurance and Finance)

Abstract

:
Background, or systematic, risks are integral parts of many systems and models in insurance and finance. These risks can, for example, be economic in nature, or they can carry more technical connotations, such as errors or intrusions, which could be intentional or unintentional. A most natural question arises from the practical point of view: is the given system really affected by these risks? In this paper we offer an algorithm for answering this question, given input-output data and appropriately constructed statistics, which rely on the order statistics of inputs and the concomitants of outputs. Even though the idea is rooted in complex statistical and probabilistic considerations, the algorithm is easy to implement and use in practice, as illustrated using simulated data.

1. Introduction

Actuarial, financial, and economic literature is abundant with models and analyses of background, or systematic, risks that affect decision making (cf., e.g., Finkelshtain et al. 1999; Franke et al. 2006, 2011; Nachman 1982; Pratt 1998; Guo et al. 2018; Furman et al. 2018; and references therein). Various models have been proposed, including additive, multiplicative, and more intricate ones that couple underlying losses (or, generally speaking, inputs) with background risks. For recent far-reaching contributions to this area, we refer to Perote et al. (2015), Su (2016), Su and Furman (2017a, 2017b) Semenikhine et al. (2018), Guo et al. (2018), as well as to the extensive lists of references therein.
Systems and thus their models are prone to a myriad of intentional or unintentional disruptions, which could affect inputs and/or outputs. The literature on the topic is vast, and some of the recent contributions include those tackling deliberate intrusions (e.g., Cárdenas et al. 2011; Premathilaka et al. 2013), and false data injections (e.g., Liang et al. 2017). A number of sophisticated methods have been developed for tackling the problems (e.g., Huang et al. 2016; Onoda 2016; He et al. 2017; Potluri et al. 2017), to name a few.
Whether or not these risks affect the underlying input variables and thus decision making is a problem of immense interest. From the conceptual point of view, broadly speaking, two scenarios arise. First, if it is suspected that the outputs are affected, then testing whether or not this is indeed the case falls, in a sense, within the context of regression analysis, though additional statistical challenges arise (e.g., Perote and Perote-Peña 2004; Perote et al. 2015.; Chen et al. 2018; Gribkova and Zitikis 2018). The second scenario, which is the main topic of the present paper, deals with the case when it is the inputs that are possibly affected by risks.
Statistically speaking, given the input and output random variables X and Y, respectively, which in the risk-free scenario are connected by a “transfer” function h via the equation
Y = h ( X ) ,
we wish to have an algorithm that would tell us whether risk-free model (1) is true or the risk-contaminated one
Y = h ( X + δ ) ,
where δ is an exogenous risk, sometimes called input-reading error, that directly affects the input X and thus, indirectly, the output variable as well. We note that Chen et al. (2018) consider model (1) with deterministic inputs, like those to be defined in Equation (3) below. Gribkova and Zitikis (2018) explore risk-free model (1), which can be viewed as the “null hypothesis” in the context of the present paper. Hence, model (2) can be viewed as the “alternative hypothesis,” and the algorithm to be constructed and illustrated in this paper will distinguish between the two hypotheses.
The rest of the paper is organized as follows. In Section 2, we lay out the foundations for assessing the presence, or absence, of input-affecting risks. In Section 3, we describe the algorithm itself. It relies on two statistics whose roles, interrelationship, and asymptotic properties are presented in Section 4 and Section 5. Section 6 concludes the paper with a brief overview of main findings.

2. The Model

Systems are usually associated with finite-length transfer windows, say [ a , b ] R , and also with transfer functions h : [ a , b ] R . Let X 1 , , X n be input random variables, which we assume to be pre-whitened (e.g., Box et al. 2015), that is, independent and identically distributed (iid). Denote their marginal cumulative distribution functions (cdf) by F ( x ) , whose support is the transfer window [ a , b ] . Hence, the input values are always in [ a , b ] . We assume that the cdf F ( x ) is strictly increasing on the interval [ a , b ] , with F ( a ) = 0 and F ( b ) = 1 . In fact, to simplify mathematics and still cover a wide variety of applications, we assume that the cdf is continuously differentiable and its probability density function (pdf) is bounded away from 0 on the transfer window [ a , b ] .
Denote the input-affecting risks by δ 1 , , δ n F δ , which act upon the inputs X 1 , , X n as visualized in Figure 1.
We assume that the input-affecting risks are pre-whitened, that is, iid random variables, and we also assume that they are independent of the input variables X 1 , , X n and are affecting their values in the additive way. The inputs X i take values in the interval [ a , b ] , but the risks δ i , being exogenous variables, are not restricted to any domain and can therefore take any real values. Our goal in this paper is to offer a practical way for detecting whether or not the risks are absent, or present. Two following notes relate our research to the topics in statistical literature.
First, the problem that we tackle is different from that dealing with errors-in-variables, where observations already contain errors, whereas in our case, the inputs X i are uncontaminated but possibly become such while being transferred into the filter, also known as the transmission channel in the engineering literature. That is, in the errors-in-variables scenario, we would observe X i + δ i , whereas in the present context we observe the original inputs X i and want to know whether or not they are affected by δ i .
Second, there is a connection between our research and classical regression, and we have already noted contributions by Perote and Perote-Peña (2004), Perote et al. (2015), where we also find extensive lists of related references. Namely, given the outputs Y i = h ( X i + δ i ) and assuming for the sake of argument that the risks δ i are small, the Taylor formula gives the approximation Y i h ( X i ) + h ( X i ) δ i , which places the input-based scenario into the output-based scenario Y i = h ( X i ) + ε i , but the risks ε i h ( X i ) δ i depend on the inputs X i via the term h ( X i ) . This dependence feature presents a major hurdle, which we circumvent in our following considerations and produce a user-friendly algorithm for detecting δ i ’s when they are present.
Throughout the paper we assume that the transfer function h ( x ) has a bounded and continuous first derivative, and we also assume that the derivative is not identically equal to 0, thus ruling out the trivial case of constant transfer functions. Actually, throughout the paper we also exclude the case h ( a ) = h ( b ) , which causes some technical complications but is hardly of practical relevance, as we shall explain in the next section. If, however, due to some considerations we would need to depart from these conditions, then there is room for relaxing the conditions, though naturally at the expense of more complex considerations.

3. The Algorithm

We first elaborate on the definition of outputs. Indeed, even though X i ’s are in the transfer window [ a , b ] , the affected inputs X i + δ i may or may not be in [ a , b ] , which is the domain of definition of the transfer function h ( x ) . Hence, the actual outputs are
Y i = h max { a , min { X i + δ i , b } } = g ( X i + δ i ) , i = 1 , , n ,
where
g ( x ) = h max { a , min { x , b } } .
Since the cdf of X is continuous, we can uniquely order the random variables X 1 , , X n . The resulting order statistics X 1 : n < < X n : n give rise to the concomitants Y 1 , n , , Y n , n (e.g., David and Nagaraja 2003). Based on them and using the notation x + = max { x , 0 } , we define the statistics
A n : = 1 n i = 2 n Y i , n Y i 1 , n +
and
B n : = 1 n i = 2 n | Y i , n Y i 1 , n | ,
and then, in turn, their ratio
I n : = A n B n .
The algorithm, to be introduced in a moment, for detecting input-affecting risks is based on asymptotics, when n gets large, of I n and B n , which we call the pivot and its supporter, thus hinting at their main and supporting roles, respectively. Before formulating the algorithm, we make the natural assumption that the risks, when they exist, should not be so large that the performance of the system would be derailed to such an extent that it becomes unnecessary to run any algorithm. For the purpose of rigour, in the following definition we summarize the circumstances under which there is ambiguity as to the absence, or presence, of input reading risks, and thus employing the algorithm becomes warranted.
Definition 1.
The presence of input-affecting risk is suspected, and thus becomes a subject for testing, when it is believed that there is a set T [ a , b ] such that the event X T has a (strictly) positive probability and, for all x T , the random variable g ( x + δ ) is non-degenerate, due to the random δ.
We note at the outset that Definition 1 is a user-friendly reformulation of technically-looking condition (10) to be presented in Section 5 below, where it plays a pivotal role in setting rigorous mathematical foundations for our algorithm. In this regard, we note that the condition is tightly tied to the indefinite growth of B n when the sample size n grows, as we shall see in Theorem 3 below. Hence, if the subject-matter knowledge is not sufficiently convincing for the decision maker to see whether or not the circumstances delineated by Definition 1 hold, then data-based checking of the asymptotic behaviour of B n for large n should clarify the situation.
Definition 1 implies that the system’s output Y = g ( X + δ ) varies not just because of X but also because of δ , assuming of course that the latter is present, that is, is not degenerate at 0. This, for example, excludes situations (as unquestionably obvious) when g ( x + δ ) = g ( a ) for every x (i.e., when δ > 0 is very large), or when g ( x + δ ) = g ( b ) for every x (i.e., when δ > 0 is very large). In either of these extreme cases, the decision maker would immediately see the system’s malfunction because of the outputs constantly lingering on, or near, the boundaries g ( a ) and g ( b ) , and thus no special testing would be warranted.
We are now ready to formulate the algorithm for detecting the input-affecting risk when its presence is suspected.
Case 1:
The pivot I n is not approaching 1 / 2 .
(i)
If I n decisively tends to a limit other than 1 / 2 , then we advise the decision maker about the absence of the risk.
(ii)
If I n seems to tend to a limit other than 1 / 2 but there is some doubt as to whether this is true, then we check if the supporter B n is asymptotically bounded, and if yes, then we advise the decision maker about the absence of the risk.
Case 2:
The pivot I n is approaching 1 / 2 .
(i)
If the supporter B n tends to infinity, then we advise the decision maker about the presence of the risk.
(ii)
If the supporter B n is asymptotically bounded, then h ( a ) and h ( b ) are likely to be insufficiently different to have already triggered Case 1 above, and we thus advise the decision maker about the absence of the risk.
In the next two sections, we present rigorous results upon which the above algorithm relies. We note in passing that irrespective of whether the algorithm detects risks or not, in either case we can still wish to double-check the findings. It can also be necessary to check the system’s vulnerability (e.g., Hug and Giampapa 2012; and references therein). In such cases, we can use artificially constructed inputs, such as
x i , n = a + ( b a ) i 1 n 1 , i = 1 , , n .
We conclude this section with an example that shows how the algorithm works in practice. For this, let the transfer function be h ( x ) = 1 ( x 0.25 ) 2 for x [ 0 , 1 ] . Furthermore, upon recalling that the (unconditional) Lomax cdf is 1 ( 1 + x / β ) ) α for x 0 , with shape and scale parameters α > 0 and β > 0 , we assume that the input X follows the Lomax ( α , β ) distribution conditioned on the transfer interval [ 0 , 1 ] . Throughout the illustration, we set α = 1 . 5 and β = 1 .
Let δ follow the normal distributions with the mean 0 and standard deviation σ . In the risk-free case (i.e., σ = 0 ), the asymptotics of I n and B n is depicted in panels (a) and (b) of Figure 2, and when σ = 0 . 1 , their asymptotics is depicted in panels (c) and (d). We also check the performance of the algorithm when the risk δ is discrete, specifically, when it is equal to 2 with probability 0.7 and to 2 with probability 0.3 . The asymptotics of I n and B n is depicted in panels (e) and (f) of Figure 2.
We see from the left-hand panels that the pivot I n converges to the limit other than 1 / 2 (i.e., to the value of I h to be defined by Equation (4) in the next section) only in the risk-free case. The increasing pattern of B n in panels (d) and (f) confirms the presence of input risk in both scenarios, which have initially been detected by the pivot I n (due to its convergence to 1 / 2 ) in panels (c) and (e). Note that the convergence to 1 / 2 in panel (e) is decisive, whereas the convergence in panel (c) may not be so well pronounced, and thus the increasing pattern of B n in panel (d) provides reassurance.

4. Asymptotics of the Pivot I n

We begin with the case when the input-affecting risk is absent, and thus the system is functioning properly. This is the starting point of many works (e.g., Cárdenas et al. 2011, p. 360) dealing with intrusion detection (e.g., Debar et al. 1999; Premathilaka et al. 2013), false data injections (e.g., Liang et al. 2017), and other disruptions. Recall the notation x + = max { x , 0 } for any x R .
Theorem 1
(Gribkova and Zitikis, 2018). If δ is absent, then, when n , the pivot I n converges to
I h : = a b ( h ( u ) ) + d u a b | h ( u ) | d u .
For another perspective on the meaning of I h , we refer to Davydov and Zitikis (2017) where I h arises as the solution to an optimization problem. The importance of Theorem 1 in the present paper follows from the fact that when the cdf F δ is non-degenerate, then (details in Section 5 below) the pivot I n converges to 1 / 2 when n . Of course, the limit 1 / 2 can also manifest when δ is absent, that is, in the context of Theorem 1, but this can happen only when h ( a ) = h ( b ) . Indeed, as it is easy to check using the equations | x | = x + + x and x = x + x with x = max { x , 0 } , we have I h = 1 / 2 if and only if h ( a ) = h ( b ) . The latter property is, however, an exception rather than the rule: it manifests in such cases when, for example, the system is down and thus h ( x ) takes the same value irrespective of x [ a , b ] . Hence, unless explicitly noted otherwise, throughout the paper we assume
h ( a ) h ( b ) ,
as we have already mentioned earlier.
We next discuss how to check whether or not the risk δ is degenerate. Naturally, in order to detect anomalies, the original state of the system has to be in reasonable working order (cf., e.g., Cárdenas et al. 2011, p. 360). Gribkova and Zitikis (2018) have put forward an argument in favour of the following definition.
Definition 2.
A system is in reasonable working order whenever in the absence of input-affecting risk (i.e., when δ = 0 almost surely), the sequence B n is asymptotically bounded in probability. In mathematical terms, we write this as B n = O P ( 1 ) when n .
Given that in the absence of input-affecting risk we are exploring the asymptotic behaviour of the pivot I n , which is the ratio of A n and B n , both of which are asymptotically bounded in probability, the requirement B n = O P ( 1 ) is natural. This can be seen from the following argument involving the mean-value theorem:
1 n i = 2 n | h ( X i : n ) h ( X i 1 : n ) | = 1 n i = 2 n | h ( ξ i ) X i : n X i 1 : n | h ( b a ) n
for some ξ i between X i 1 : n and X i : n , where
h : = sup a x b | h ( x ) | < .
As a side-note, the right-hand side of bound (6) implies that, if needed, the boundedness of the first derivative of the transfer function can be relaxed and the system can still remain in reasonable working order, as per Definition 2.
We next present an example that shows what happens with the system when the input-affecting risk is present, that is, when the cdf F δ is non-degenerate. Before starting the example, we recall (David and Nagaraja 2003) that the concomitants Y 1 , n , , Y n , n can be written as follows
Y i , n = g X i : n + δ [ i ] ,
where δ [ i ] is the random variable among δ 1 , , δ n that corresponds to X i : n . As noted by David and Nagaraja (2003, p. 145), the random variables δ [ 1 ] , , δ [ n ] are iid and follow the cdf F δ of the original risk δ .
Example 1.
Let δ take value c > 0 with probability p ( 0 , 1 ) and c with probability 1 p , and let c b a . The latter assumption implies that irrespective of the value of X i : n , the value of X i : n + δ [ i ] is above b with probability p and below a with probability 1 p . Hence, the concomitant Y i , n is equal to h ( b ) with probability p and to h ( a ) with probability 1 p . Since each concomitant can take only two values, | Y i , n Y i 1 , n | is equal to | h ( b ) h ( a ) | when δ [ i ] δ [ i 1 ] and 0 otherwise. Consequently,
| Y i , n Y i 1 , n | = | h ( b ) h ( a ) | 2 c | δ [ i ] δ [ i 1 ] | ,
which implies
B n = | h ( b ) h ( a ) | 2 c 1 n i = 2 n | δ [ i ] δ [ i 1 ] | E | δ [ i ] δ [ i 1 ] | + n 1 n E | δ [ i ] δ [ i 1 ] | = | h ( b ) h ( a ) | 2 c n E | δ [ i ] δ [ i 1 ] | + O P ( 1 ) .
Since the variables δ [ 1 ] , , δ [ n ] are iid and follow the same cdf F δ as the original δ, the mean E [ | δ [ i ] δ [ i 1 ] | ] is equal to 4 c p ( 1 p ) and thus Equation (7) implies
B n = 2 n p ( 1 p ) | h ( b ) h ( a ) | + O P ( 1 ) .
From this we conclude that if p is neither 0 nor 1, which we assume, and if h ( b ) h ( a ) , which we also assume, then B n P when n . Analogous arguments lead to
A n = n p ( 1 p ) | h ( b ) h ( a ) | + O P ( 1 ) .
Combining statements (8) and (9), we have I n = A n / B n P 1 / 2 when n , which in turn implies that the system is affected by the risk. This concludes Example 1.
The above example has been constructed to show—in a somewhat dramatic way—what happens when the input-affecting risk pushes the input outside the transfer window, but the same conclusion can be reached under much weaker assumptions on δ , as we shall show in the next section.

5. Growth of the Supporter B n

The following general result plays a major role in the justification of the earlier presented algorithm.
Theorem 2.
Gribkova and Zitikis (2018) Let ( X 1 , Y 1 ) , , ( X n , Y n ) be independent copies of a generic random pair ( X , Y ) , with X having continuous cdf and Y having finite second moment. If B n P , then I n P 1 / 2 when n .
We know from statement (6) and the arguments around it that if δ is degenerate, then B n P cannot be true. In the next theorem, we give a necessary and sufficient condition for B n P to hold, which, according to Theorem 2, implies I n P 1 / 2 .
Theorem 3.
The statement B n P holds if and only if
0 1 ( 2 t 1 ) 0 1 F g ( x s + δ ) 1 ( t ) d s d t > 0 ,
where x s = F 1 ( s ) is the s t h percentile of X, and F g ( x s + δ ) 1 ( t ) denotes the quantile function of the random variable g ( x s + δ ) .
Condition (10) arises naturally, but its formulation is not user friendly. Remarkably, its meaning is very simple and has already been conveyed in Definition 1. Before proving Theorem 3, we next illuminate the meaning of condition (10) by revisiting Example 1 through the lens of the condition.
Example 2.
Let δ take value c > 0 with probability p ( 0 , 1 ) and c with probability 1 p , and let c b a . Since for every s ( 0 , 1 ) we have x s = F 1 ( s ) [ a , b ] , the random variable g ( x s + δ ) has the probability distribution
g ( x s + δ ) = h ( a ) w i t h p r o b a b i l i t y 1 p , h ( b ) w i t h p r o b a b i l i t y p .
To obtain its quantile function, we start with the case h ( a ) h ( b ) and have the formula
F g ( x s + δ ) 1 ( t ) = h ( a ) w h e n 0 < t 1 p , h ( b ) w h e n 1 p < t 1 .
Consequently,
0 1 ( 2 t 1 ) 0 1 F g ( x s + δ ) 1 ( t ) d s d t = h ( a ) 0 1 p ( 2 t 1 ) d t + h ( b ) 1 p 1 ( 2 t 1 ) d t = p ( 1 p ) h ( b ) h ( a ) .
Analogous calculations when h ( a ) h ( b ) give the answer p ( 1 p ) ( h ( a ) h ( b ) ) , thus establishing the equation
0 1 ( 2 t 1 ) 0 1 F g ( x s + δ ) 1 ( t ) d s d t = p ( 1 p ) | h ( b ) h ( a ) |
irrespective of the values of h ( a ) and h ( b ) . We can therefore conclude that as long as h ( b ) h ( a ) and p is neither 0 nor 1, condition (10) is satisfied. Thus, we have B n P according to Theorem 3.
Proof of Theorem 3.
We first show that if condition (10) is satisfied, then B n P . We start with the bound
B n = 1 n i = 2 n | g ( X i : n + δ [ i ] ) g ( X i 1 : n + δ [ i 1 ] ) | 1 n i = 2 n | g ( X i 1 : n + δ [ i ] ) g ( X i 1 : n + δ [ i 1 ] ) | 1 n i = 2 n | g ( X i : n + δ [ i ] ) g ( X i 1 : n + δ [ i ] ) | .
Since the transfer function h ( x ) has a bounded derivative on the interval [ a , b ] , the function g ( x ) is Lipschitz continuous on the entire real line, that is, | g ( x ) g ( y ) | h | x y | for all x , y R . Continuing with bound (11), we have
B n 1 n i = 2 n | g ( X i 1 : n + δ [ i ] ) g ( X i 1 : n + δ [ i 1 ] ) | h ( b a ) n = 1 n i = 2 n | g ( X i 1 + δ i ) g ( X i 1 + δ i 1 ) | h ( b a ) n = n 1 n E | g ( X + δ 2 ) g ( X + δ 1 ) | h ( b a ) n + O P ( 1 ) ,
because (i) the inputs X i and the risks δ i are independent, (ii) the inputs X i have the same cdf F, and (iii) the risks δ i have the same cdf F δ . Hence, if the expectation on the right-hand side of bound (12) does not vanish, then we must have B n P when n . The proof of the converse (i.e., if B n P , then condition (13) is satisfied) follows from the same arguments but now with “+” instead of “−” and the reversed inequalities in bounds (11) and (12).
We are left to show that the statement
E | g ( X + δ 2 ) g ( X + δ 1 ) | > 0
holds if and only if condition (10) is satisfied. We do so with the help of the equation
E | g ( X + δ 2 ) g ( X + δ 1 ) | = 2 0 1 ( 2 t 1 ) R F g ( x + δ ) 1 ( t ) d F ( x ) d t ,
which trivially follows from
E | g ( X + δ 2 ) g ( X + δ 1 ) | = E GMD ( X ) = 0 1 GMD ( x s ) d s ,
where GMD ( x ) is the Gini mean difference of the variable g ( x + δ ) , defined by
GMD ( x ) : = E | g ( x + δ 2 ) g ( x + δ 1 ) | = 2 0 1 ( 2 t 1 ) F g ( x + δ ) 1 ( t ) d t .
The right-most equation holds due to the well-known representation of the Gini mean difference as a Choquet integral (e.g., Giorgi 1993; Yitzhaki and Schechtman 2013; Furman et al. 2017; and references therein). We conclude with the note that the Gini mean difference is known to be (strictly) positive whenever the underlying random variable is non-degenerate, which in our case is g ( x + δ ) . Hence, by assuming non-degeneracy of g ( x + δ ) for every x T [ a , b ] such that P [ X T ] > 0 , we arrive at condition (13) and thus, in turn, at (10). The proof of Theorem 3 is finished. ☐

6. Concluding Notes

The need for an algorithm that distinguishes between the “null hypothesis” Y = g ( X ) and the “alternative” Y = g ( X + δ ) for exogenous background risk δ arises in many problems of economics, insurance, and finance. In the present paper, we have developed a user-friendly algorithm for distinguishing between the aforementioned two hypotheses. The algorithm is based on the asymptotic behaviour of two statistics: the pivot I n and its supporter B n , which are constructed using the order statistics of inputs and the corresponding concomitants of outputs. We have supplemented our theoretical considerations with illustrative examples, graphs, and discussions, thus facilitating the use of the algorithm in practice.
As we have noted in the Introduction, practical considerations give rise to alternatives which couple X and δ not just in the additive way but possibly in a more intricate way, which we generally formulate as Y = g ( X , δ ) . In this regard we also note that X and δ might be dependent random variables, and even multivariate ones, thus giving rise to a highly non-trivial follow-up problem.

Author Contributions

Both authors have contributed equally to the paper.

Funding

Research of the second author has been supported by the Natural Sciences and Engineering Research Council of Canada.

Acknowledgments

We are indebted to three anonymous reviewers for careful reading, constructive criticism, and numerous suggestions that resulted in a major revision of the original submission.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Box, George Edward Pelham, Gwilym Meirion Jenkins, Gregory C. Reinsel, and Greta M. Ljung. 2015. Time Series Analysis: Forecasting and Control, 5th ed. New York: Wiley. [Google Scholar]
  2. Cárdenas, Alvaro A., Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, and Shankar Sastry. 2011. Attacks against process control systems: Risk assessment, detection, and response. Paper presented at the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, March 22–24; pp. 355–66. [Google Scholar]
  3. Chen, Lingzhi, Youri Davydov, Nadezhda Gribkova, and Ričardas Zitikis. 2018. Estimating the index of increase via balancing deterministic and random data. Mathematical Methods of Statistics 27: 83–102. [Google Scholar] [CrossRef]
  4. David, Herbert A., and Haikady N. Nagaraja. 2003. Order Statistics, 3rd ed. New York: Wiley. [Google Scholar]
  5. Davydov, Youri, and Ričardas Zitikis. 2017. Quantifying non-monotonicity of functions and the lack of positivity in signed measures. Modern Stochastics: Theory and Applications 4: 219–31. [Google Scholar] [CrossRef]
  6. Debar, Hervé, Marc Dacier, and Andreas Wespi. 1999. Towards a taxonomy of intrusion-detection systems. Computer Networks 31: 805–22. [Google Scholar] [CrossRef]
  7. Finkelshtain, Israel, Offer Kella, and Marco Scarsini. 1999. On risk aversion with two risks. Journal of Mathematical Economics 31: 239–50. [Google Scholar] [CrossRef]
  8. Franke, Günter, Harris Schlesinger, and Richard C. Stapleton. 2006. Multiplicative background risk. Management Science 52: 146–53. [Google Scholar] [CrossRef]
  9. Franke, Günter, Harris Schlesinger, and Richard C. Stapleton. 2011. Risk taking with additive and multiplicative background risks. Journal of Economic Theory 146: 1547–68. [Google Scholar] [CrossRef]
  10. Furman, Edward, Ruodu Wang, and Zitikis ardas. 2017. Gini-type measures of risk and variability: Gini shortfall, capital allocations, and heavy-tailed risks. Journal of Banking and Finance 83: 70–84. [Google Scholar] [CrossRef]
  11. Furman, Edward, Alexey Kuznetsov, and Ričardas Zitikis. 2018. Weighted risk capital allocations in the presence of systematic risk. Insurance: Mathematics and Economics 79: 75–81. [Google Scholar]
  12. Giorgi, Giovanni. 1993. A fresh look at the topical interest of the Gini concentration ratio. Metron 51: 83–98. [Google Scholar]
  13. Gribkova, Nadezhda, and Ričardas Zitikis. 2018. Assessing transfer functions in control systems. arXiv, arXiv:1805.10633. [Google Scholar]
  14. Guo, Xu, Andreas Wagener, Wing-Keung Wong, and Lixing Zhu. 2018. The two-moment decision model with additive risks. Risk Management 20: 77–94. [Google Scholar] [CrossRef]
  15. Guo, Xu, Raymond Honfu Chan, Wing-Keung Wong, and Lixing Zhu. 2018. Mean-variance, mean-VaR, and mean-CVaR models for portfolio selection with background risk. Risk Management. [Google Scholar] [CrossRef]
  16. He, Youbiao, Gihan J. Mendis, and Jin Wei. 2017. Real-rime detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Transactions on Smart Grid 8: 2505–16. [Google Scholar] [CrossRef]
  17. Huang, Yi, Jin Tang, Yu Cheng, Husheng Li, Kristy A. Campbell, and Zhu Han. 2016. Real-time detection of false data injection in smart grid networks: An adaptive CUSUM method and analysis. IEEE Systems Journal 10: 532–43. [Google Scholar] [CrossRef]
  18. Hug, Gabriela, and Joseph Andrew Giampapa. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid 3: 1362–70. [Google Scholar] [CrossRef]
  19. Liang, Gaoqi, Junhua Zhao, Fengji Luo, Steven R. Weller, and Zhao Yang Dong. 2017. A review of false data injection attacks against modern power systems. IEEE Transactions on Smart Grid 8: 1630–38. [Google Scholar] [CrossRef]
  20. Nachman, David. 1982. Preservation of “more risk averse” under expectations. Journal of Economic Theory 28: 361–68. [Google Scholar] [CrossRef]
  21. Onoda, Takashi. 2016. Probabilistic models-based intrusion detection using sequence characteristics in control system communication. Neural Computing and Applications 27: 1119–27. [Google Scholar] [CrossRef]
  22. Perote, Javier, and Juan Perote-Peña. 2004. Strategy-proof estimators for simple regression. Mathematical Social Sciences 47: 153–76. [Google Scholar] [CrossRef]
  23. Perote, Javier, Juan Perote-Peña, and Marc Vorsatz. 2015. Strategic behavior in regressions: An experimental study. Theory and Decision 79: 517–46. [Google Scholar] [CrossRef]
  24. Potluri, Sasanka, Christian Diedrich, and Girish Kumar Reddy Sangala. 2017. Identifying false data injection attacks in industrial control systems using artificial neural networks. Paper presented at the 22nd IEEE International Conference on Emerging Technologies and Factory Automation, Limassol, Cyprus, December 21; pp. 1–8. [Google Scholar]
  25. Pratt, John W. 1998. Aversion to one risk in the presence of others. Journal of Risk and Uncertainty 1: 395–413. [Google Scholar] [CrossRef]
  26. Premathilaka, Nalaka Arjuna, Achala Chathuranga Aponso, and Naomi Krishnarajah. 2013. Review on state of art intrusion detection systems designed for the cloud computing paradigm. Paper presented at 47th International Carnahan Conference on Security Technology, Medellin, Colombia, October 8–11; pp. 1–6. [Google Scholar]
  27. Semenikhine, Vadim, Edward Furman, and Jianxi Su. 2018. On a multiplicative multivariate gamma distribution with applications in insurance. Risks 6: 79. [Google Scholar] [CrossRef]
  28. Su, Jianxi. 2016. Multiple Risk Factors Dependence Structures with Applications to Actuarial Risk Management. Ph.D. Dissertation, York University, Toronto, ON, Canada. [Google Scholar]
  29. Su, Jianxi, and Edward Furman. 2017a. A form of multivariate Pareto distribution with applications to financial risk measurement. ASTIN Bulletin 47: 331–57. [Google Scholar] [CrossRef]
  30. Su, Jianxi, and Edward Furman. 2017b. Multiple risk factor dependence structures: Distributional properties. Insurance: Mathematics and Economics 76: 56–68. [Google Scholar] [CrossRef]
  31. Yitzhaki, Shlomo, and Edna Schechtman. 2013. The Gini Methodology: A Primer on a Statistical Methodology. New York: Springer. [Google Scholar]
Figure 1. Are the input-affecting risks absent (i.e., degenerate at 0) or not?
Figure 1. Are the input-affecting risks absent (i.e., degenerate at 0) or not?
Risks 06 00100 g001
Figure 2. B n for discrete ± 2 risk.
Figure 2. B n for discrete ± 2 risk.
Risks 06 00100 g002

Share and Cite

MDPI and ACS Style

Gribkova, N.; Zitikis, R. A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model. Risks 2018, 6, 100. https://doi.org/10.3390/risks6030100

AMA Style

Gribkova N, Zitikis R. A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model. Risks. 2018; 6(3):100. https://doi.org/10.3390/risks6030100

Chicago/Turabian Style

Gribkova, Nadezhda, and Ričardas Zitikis. 2018. "A User-Friendly Algorithm for Detecting the Influence of Background Risks on a Model" Risks 6, no. 3: 100. https://doi.org/10.3390/risks6030100

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop