Björk F, Henkel M, Stirna J, Zdravkovic J (2015) Cyber Resilience – Fundamentals for a Definition. In: A. Rocha, A. Correia, S. Costanzo & L. Reis, eds. New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing. Cham: Springer International Publishing, pp. 3-4. https://doi.org/10.1007/978-3-319-16528-8
Bodeau D, Graubart R, Heinbockel W, Laderman E (2015) Cyber Resiliency Engineering Aid – The Updated Cyber Resiliency Engineering Framework and Guidance on Applying Cyber Resiliency Techniques, Bedford, MA: Mitre Corporation.
Carías JF, Arrizabalaga S, Labaka L & Hernantes J (2021) Cyber Resilience Self-Assessment Tool (CR-SAT) for SMEs. IEEE Access, 9(1), pp. 80741-80762 https://doi.org/10.1109/ACCESS.2021.3085530
Cherdantsevaa Y, Burnap P, Blyth A, Eden P, Jones HS, Stoddart K (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 56(1), pp. 1-27. https://doi.org/10.1016/j.cose.2015.09.009
Groenendal J, Helsloot I (2021) Cyber Resilience during the COVID-19 Pandemic crisis: A case study. Journal of Contingencies and Crisis Management, 29(4), pp. 439-444 https://doi.org/10.1111/1468-5973.12360
Haque MA, Teyou GKD, Shetty S, Krishnappa B (2018) Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights. Miami, IEEE, pp. 25-30 https://doi.org/10.1109/ISI.2018.8587398
Johnson C (2016) Why We Cannot (Yet) Ensure the Cyber-Security of Safety-Critical Systems. Brighton, Safety-Critical Systems Club, pp. 171-182
Kott A, Linkov I (2019) Cyber Resilience of Systems and Networks. 1st ed. Cham: Springer https://doi.org/10.1007/978-3-319-77492-3
Kott A, Linkov I (2021) To Improve Cyber Resilience, Measure It. Computer, Feb, 54(2), pp. 80-85 https://doi.org/10.1109/MC.2020.3038411
Leversage DJ, Byres EJ (2008) Estimating a system's mean time-to-compromise. IEEE Security and Privacy, 1 1, pp. 52-60 https://doi.org/10.1109/MSP.2008.9
Linkov I, Bridges T, Creutzig F, Decker J, Fox-Lent C, Kroger W, Lambert JH, Levermann A, Montreil B, Nathwani J, Nyer R, Renn O, Scharte B, Scheffler A, Schreurs M, Thiel-Clemen T (2014) Changing the resilience paradigm. Nature Climate Change, 4(1), pp. 407-409 https://doi.org/10.1038/nclimate2227
Linkov I, Eisenberg DA, Plourde K, Seagar TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environment Systems and Decisions, Nov, 33(1), pp. 471-476 https://doi.org/10.1007/s10669-013-9485-y
Linkov I, Kott A (2018) Fundamental Concepts of Cyber Resilience: Introduction and Overview. In: I. Linkov & A. Kott, eds. Cyber Resilience of Systems and Networks. Cham: Springer, pp. 1-25 https://doi.org/10.1007/978-3-319-77492-3_1
Maglaras LA, Kim K-H, Janicke H, Ferrag MA, Rallis S, Fragkou P, Maglaras A, Cruz TJ (2018) Cyber security of critical infrastructures. ICT Express, 4(1), pp. 42-45. https://doi.org/10.1016/j.icte.2018.02.001
Mitre Corp. (2012) Cyber Resiliency Metrics, Measures of Effectiveness, and Scoring, Bedford, MA: Mitre Corporation, Department No. T8A2
Mitre Corp. (2017) ATT&CK Matrix for Enterprise. [Online]
Available at: https://attack.mitre.org
[Accessed 15th Jan 2021].
National Institute of Standards and Technology (2012) Guide for Conducting Risk Assessments. NIST SP 800-30 Rev 1 ed. Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2013) Security and Privacy Controls for Federal Information Systems and Organizations. NIST SP 800-53 ed. Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2014) Framework for Improving Critical Infrastructure Cybersecurity (Version 1.0), Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2018) Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1), Washington, D.C.: U.S. Department of Commerce
National Institute of Standards and Technology (2021) Developing Cyber Resilient Systems: A Systems Security Engineering Approach. NIST SP 800-160 ed. Washington, D.C.: U.S. Department of Commerce
Office of Cybersecurity, Energy Security, and Emergency Response (2012) Cybersecurity Capability Maturity Model (C2M2). [Online]
Available at: https://www.energy.gov/ceser/cybersecurity-capability-maturity-model-c2m2
[Accessed 1 June 2021]
Reeder JR, Hall T (2021) Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial Pipeline Ransomware Attack. The Cyber Defence Review, 1 August, pp. 15-39
Simonovich L (2020) Thriving in a Digitized Environment [Online]
Available at: https://www.securitymagazine.com/articles/93849-leo-simonovich-thriving-in-a-digitized-environment
[Accessed 1 October 2021]
Singh R, Hutton ST, Donahoo MJ, Sicker D (2021) Toward Grading Cybersecurity & Resilience Posture for Cyber Physical Systems. McKinney, TX, Elsevier http://dx.doi.org/10.2139/ssrn.3897119
Williams T (1992) The Purdue Enterprise Reference Architecture, A Technical Guide for CIM Planning and Implementation I. First ed. Research Triangle: Instrument Society of America