Cyber-attacks cost businesses millions of dollars every year, a key component of which is the cost of business disruption from system downtime. As cyber-attacks cannot all be prevented, there is a need to consider the cyber resilience of systems, i.e. the ability to withstand cyber-attacks and recover from them. Previous works discussing system cyber resilience typically either offer generic high-level guidance on best practices, provide limited attack modelling, or apply to systems with special characteristics. There is a lack of an approach to system cyber resilience evaluation that is generally applicable yet provides a detailed consideration for the system-level impacts of cyber-attacks and defences. We propose a methodology for e...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Cyber-Physical Systems (CPSs) interconnect the physical world with digital computers and networks in...
Resilience is a relatively new concept in computer security that is continuing to evolve. The resear...
We investigate the extent to which redundancy (including with diversity) can help mitigate the impac...
Considering the potential magnitude and impact of cyber-attacks, organizations must be able to under...
Systems and attacks are becoming more complex, and classical cyber security methods are failing to p...
Given the difficulty of fully securing complex cyber systems, there is growing interest in making cy...
Cyber resilience is the most important feature of any cyber system, especially during the transition...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of comple...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight t...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
The management of cyber issues has become essential for business success, since the activities of or...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Cyber-Physical Systems (CPSs) interconnect the physical world with digital computers and networks in...
Resilience is a relatively new concept in computer security that is continuing to evolve. The resear...
We investigate the extent to which redundancy (including with diversity) can help mitigate the impac...
Considering the potential magnitude and impact of cyber-attacks, organizations must be able to under...
Systems and attacks are becoming more complex, and classical cyber security methods are failing to p...
Given the difficulty of fully securing complex cyber systems, there is growing interest in making cy...
Cyber resilience is the most important feature of any cyber system, especially during the transition...
Cyber security is commonly defined as the practice of protecting computers, networks, programs and d...
In this paper we report on a recent study of the impact of cyber-attacks on the resilience of comple...
The losses arising from a system being hit by cyber attacks can be staggeringly high, but defending ...
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight t...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
The management of cyber issues has become essential for business success, since the activities of or...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Cyber-Physical Systems (CPSs) interconnect the physical world with digital computers and networks in...
Resilience is a relatively new concept in computer security that is continuing to evolve. The resear...