A Survey on cyber resilience: Key strategies, research challenges, and future directions
Cyber resilience has become a major concern for both academia and industry due to the
increasing number of data breaches caused by the expanding attack surface of existing IT …
increasing number of data breaches caused by the expanding attack surface of existing IT …
A path to build supply chain cyber-resilience through absorptive capacity and visibility: Two empirical studies
Little is known about cyber-resilience in supply chain management. Using two empirical
studies, this paper examines how visibility impacts cyber-resilience in times of data …
studies, this paper examines how visibility impacts cyber-resilience in times of data …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
Data systems in supply chain resilience: moderated moderating effects of enterprise resource planning
Purpose Outsourcing and offshoring practices have introduced a high level of complexity
into operations and supply chains, involving suppliers and manufacturers from various …
into operations and supply chains, involving suppliers and manufacturers from various …
Interconnected and resilient: A CGE analysis of AI‐driven cyberattacks in global trade
The burgeoning interconnectedness of global trade in the digital age not only presents
enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI) …
enticing opportunities but also harbors potent vulnerabilities of artificial intelligence (AI) …
Incorporating cyber resilience into computable general equilibrium models
Most countries are becoming increasingly dependent on cyber inputs for business,
government, and private pursuits. Disruptions of the cyber system can therefore have …
government, and private pursuits. Disruptions of the cyber system can therefore have …
Using Statistical Model Checking for Cybersecurity Analysis
This work discusses an approach to estimate the likelihood of occurrence and evolution in
time of software security issues. First, software vulnerability assessment is revised under the …
time of software security issues. First, software vulnerability assessment is revised under the …