A Survey on cyber resilience: Key strategies, research challenges, and future directions

SM Alhidaifi, MR Asghar, IS Ansari - ACM Computing Surveys, 2024‏ - dl.acm.org
Cyber resilience has become a major concern for both academia and industry due to the
increasing number of data breaches caused by the expanding attack surface of existing IT …

A path to build supply chain cyber-resilience through absorptive capacity and visibility: Two empirical studies

K Sadeghi, A Azadegan, D Ojha - Industrial Marketing Management, 2023‏ - Elsevier
Little is known about cyber-resilience in supply chain management. Using two empirical
studies, this paper examines how visibility impacts cyber-resilience in times of data …

[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice

B Dupont, C Shearing, M Bernier, R Leukfeldt - Computers & security, 2023‏ - Elsevier
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …

Data systems in supply chain resilience: moderated moderating effects of enterprise resource planning

K Sadeghi R, D Ojha, A Azadegan - Industrial Management & Data …, 2025‏ - emerald.com
Purpose Outsourcing and offshoring practices have introduced a high level of complexity
into operations and supply chains, involving suppliers and manufacturers from various …

Interconnected and resilient: A CGE analysis of AI‐driven cyberattacks in global trade

R Osman, S El‐Gendy - Risk Analysis, 2024‏ - Wiley Online Library
The burgeoning interconnectedness of global trade in the digital age not only presents
enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI) …

Incorporating cyber resilience into computable general equilibrium models

A Rose - Advances in Spatial and Economic Modeling of …, 2019‏ - Springer
Most countries are becoming increasingly dependent on cyber inputs for business,
government, and private pursuits. Disruptions of the cyber system can therefore have …

Using Statistical Model Checking for Cybersecurity Analysis

CE Budde - International Workshop on Digital Sovereignty in Cyber …, 2022‏ - Springer
This work discusses an approach to estimate the likelihood of occurrence and evolution in
time of software security issues. First, software vulnerability assessment is revised under the …