{"id":"https://openalex.org/W4413679648","doi":"https://doi.org/10.1109/csr64739.2025.11129978","title":"Cyber Resilience Strategies Throughout the System Development Lifecycle","display_name":"Cyber Resilience Strategies Throughout the System Development Lifecycle","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413679648","doi":"https://doi.org/10.1109/csr64739.2025.11129978"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11129978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11129978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119437527","display_name":"Grant Deffenbaugh","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]},{"id":"https://openalex.org/I114772536","display_name":"Software Engineering Institute","ror":"https://ror.org/01xqjjn94","country_code":"US","type":"facility","lineage":["https://openalex.org/I114772536","https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Grant Deffenbaugh","raw_affiliation_strings":["Carnegie Mellon University,Software Engineering Institute,Pittsburgh,USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University,Software Engineering Institute,Pittsburgh,USA","institution_ids":["https://openalex.org/I114772536","https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5119437528","display_name":"Srinidhi Kameneni","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srinidhi Kameneni","raw_affiliation_strings":["Carnegie Mellon University,Heinz College,Pittsburgh,USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University,Heinz College,Pittsburgh,USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5119437527"],"corresponding_institution_ids":["https://openalex.org/I114772536","https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":1.5458,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87303237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"504","last_page":"509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9200000166893005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9200000166893005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9100000262260437,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/system-lifecycle","display_name":"System lifecycle","score":0.682420551776886},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6662631034851074},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5615766644477844},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.45861366391181946},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3502787947654724},{"id":"https://openalex.org/keywords/application-lifecycle-management","display_name":"Application lifecycle management","score":0.25892043113708496},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.24024102091789246},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19653946161270142},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.0756327211856842}],"concepts":[{"id":"https://openalex.org/C35280785","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"System lifecycle","level":4,"score":0.682420551776886},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6662631034851074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5615766644477844},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.45861366391181946},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3502787947654724},{"id":"https://openalex.org/C30452754","wikidata":"https://www.wikidata.org/wiki/Q621590","display_name":"Application lifecycle management","level":3,"score":0.25892043113708496},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.24024102091789246},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19653946161270142},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0756327211856842},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11129978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11129978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2022022398","https://openalex.org/W2110829237","https://openalex.org/W2160265998","https://openalex.org/W2160306045","https://openalex.org/W2560808154","https://openalex.org/W2809762474","https://openalex.org/W2810065801","https://openalex.org/W2810115605","https://openalex.org/W2810165217","https://openalex.org/W2810169178","https://openalex.org/W2810186446","https://openalex.org/W2810678705","https://openalex.org/W2811090094","https://openalex.org/W2811241875","https://openalex.org/W2811366311","https://openalex.org/W2811395468","https://openalex.org/W3025038642","https://openalex.org/W3127154666","https://openalex.org/W3132670582","https://openalex.org/W3177669185","https://openalex.org/W4200579948","https://openalex.org/W4285356980","https://openalex.org/W4312326099","https://openalex.org/W4387161852","https://openalex.org/W4392121222","https://openalex.org/W4392633968","https://openalex.org/W4395671973"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2187616768","https://openalex.org/W2137744036","https://openalex.org/W2992574669","https://openalex.org/W4386713927","https://openalex.org/W4296426137","https://openalex.org/W2527804313"],"abstract_inverted_index":{"As":[0],"cyber":[1,10,29,58,128],"threats":[2],"continue":[3],"to":[4,27,48,69,116,123],"evolve":[5],"in":[6,17],"complexity":[7,141],"and":[8,46,91,112],"frequency,":[9],"resilience":[11,30,59,77,129,137],"has":[12],"become":[13],"a":[14,24,53,96,105,124],"fundamental":[15],"consideration":[16],"modern":[18],"system":[19,86,109,118],"development.":[20],"This":[21],"paper":[22,103],"presents":[23],"structured":[25,125],"approach":[26],"integrating":[28],"strategies":[31,60,65],"throughout":[32],"the":[33,64,70,82,131],"System":[34],"Development":[35],"Lifecycle":[36],"(SDLC),":[37],"ensuring":[38],"that":[39,76],"systems":[40],"can":[41],"anticipate,":[42],"withstand,":[43],"recover":[44],"from,":[45],"adapt":[47],"disruptions.":[49],"To":[50],"achieve":[51],"this,":[52],"comprehensive":[54],"review":[55],"of":[56,85,99],"existing":[57],"was":[61],"conducted,":[62],"then":[63],"were":[66],"systematically":[67],"mapped":[68],"SDLC":[71],"stages.":[72],"The":[73,120],"mapping":[74],"ensures":[75],"is":[78],"embedded":[79],"proactively":[80],"from":[81],"earliest":[83],"stages":[84],"design":[87],"through":[88],"deployment,":[89],"operation,":[90],"eventual":[92],"decommissioning.":[93],"By":[94],"providing":[95],"stage-by-stage":[97],"breakdown":[98],"resilience-enhancing":[100],"practices,":[101],"this":[102],"offers":[104],"practical":[106],"guide":[107],"for":[108,127],"designers,":[110],"engineers,":[111],"cybersecurity":[113],"professionals":[114],"seeking":[115],"strengthen":[117],"robustness.":[119],"findings":[121],"contribute":[122],"framework":[126],"within":[130],"SDLC,":[132],"offering":[133],"insights":[134],"into":[135],"optimizing":[136],"without":[138],"introducing":[139],"unnecessary":[140],"or":[142],"cost.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
