Analysing cyber-insurance claims to design harm-propagation trees | IEEE Conference Publication | IEEE Xplore