{"id":"https://openalex.org/W4406611288","doi":"https://doi.org/10.1109/wsc63780.2024.10838964","title":"How Hard is it to Estimate Systemic Enterprise Cyber Risk?","display_name":"How Hard is it to Estimate Systemic Enterprise Cyber Risk?","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406611288","doi":"https://doi.org/10.1109/wsc63780.2024.10838964"},"language":"en","primary_location":{"id":"doi:10.1109/wsc63780.2024.10838964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wsc63780.2024.10838964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Winter Simulation Conference (WSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101533401","display_name":"Ranjan Pal","orcid":"https://orcid.org/0000-0003-2791-4606"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ranjan Pal","raw_affiliation_strings":["MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"],"affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017786725","display_name":"Rohan Xavier Sequeira","orcid":"https://orcid.org/0000-0003-3433-5725"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rohan Xavier Sequeira","raw_affiliation_strings":["University of Southern California,Electrical and Computer Engineering,Los Angeles,CA,USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California,Electrical and Computer Engineering,Los Angeles,CA,USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115947032","display_name":"Sander Zeijlmaker","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sander Zeijlmaker","raw_affiliation_strings":["MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA"],"affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management, Massachusetts Institute of Technology,Cambridge,MA,USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101533401"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":3.9362,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.94240453,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"560","last_page":"571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12276","display_name":"Risk Management in Financial Firms","score":0.7605999708175659,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12276","display_name":"Risk Management in Financial Firms","score":0.7605999708175659,"subfield":{"id":"https://openalex.org/subfields/1402","display_name":"Accounting"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11864","display_name":"Supply Chain Resilience and Risk Management","score":0.6705999970436096,"subfield":{"id":"https://openalex.org/subfields/1408","display_name":"Strategy and Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6014406085014343}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6014406085014343}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wsc63780.2024.10838964","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wsc63780.2024.10838964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Winter Simulation Conference (WSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321849","display_name":"Chinese Academy of Meteorological Sciences","ror":"https://ror.org/034b53w38"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W91264121","https://openalex.org/W1516366611","https://openalex.org/W1992516166","https://openalex.org/W2004892226","https://openalex.org/W2013549980","https://openalex.org/W2072802070","https://openalex.org/W2074035703","https://openalex.org/W2078309362","https://openalex.org/W2112470886","https://openalex.org/W2889235759","https://openalex.org/W2963793797","https://openalex.org/W3043043583","https://openalex.org/W3109884150","https://openalex.org/W3148193891","https://openalex.org/W3164105561","https://openalex.org/W4213455294","https://openalex.org/W4306696437"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Systemic":[0],"enterprise":[1,14,66,144],"cyber":[2],"risk":[3],"typically":[4],"arises":[5],"when":[6],"a":[7,82],"single":[8],"(software)":[9],"vulnerability":[10,40],"common":[11],"across":[12,17],"many":[13],"computing":[15],"devices":[16],"the":[18,44,90,118,125,132],"globe":[19],"is":[20,58,75],"exploited":[21],"by":[22,34],"adversaries,":[23],"and":[24,46,105,136],"results":[25],"in":[26,65,94,113],"catastrophic":[27,110],"aggregate":[28],"cyber-loss":[29],"consequences":[30],"to":[31,60],"be":[32],"borne":[33],"CRM":[35,100,133],"entities.":[36],"Examples":[37],"of":[38,120,128],"such":[39,97],"exploitation":[41],"incidents":[42],"include":[43],"Log4j":[45],"SolarWinds":[47],"cyber-attacks.":[48],"The":[49],"important":[50],"question":[51,74],"we":[52,123],"ask":[53],"here":[54],"is:":[55],"how":[56],"hard":[57],"it":[59],"discover":[61,93],"these":[62],"\u2018single":[63],"vulnerabilities'":[64],"information":[67],"systems?":[68],"We":[69],"prove":[70],"that":[71],"answering":[72],"this":[73],"NP-hard.":[76],"Alternatively,":[77],"leave":[78],"alone":[79],"humans,":[80],"even":[81],"computer":[83],"via":[84],"cyber-attack":[85],"simulations":[86],"might":[87],"not":[88],"(in":[89],"worst":[91],"case)":[92],"finite":[95],"time":[96,114],"vulnerabilities.":[98],"Consequently,":[99],"entities":[101],"can":[102],"only":[103],"expect":[104],"prepare":[106],"for":[107,131,141],"an":[108],"inevitable":[109],"systemic":[111,143],"cyber-incident":[112],"rather":[115],"than":[116],"predict":[117],"likelihood":[119],"one.":[121],"Likewise,":[122],"propose":[124],"policy":[126],"implications":[127],"our":[129],"research":[130],"market":[134],"stakeholders":[135],"elucidate":[137],"relevant":[138],"action":[139],"items":[140],"effective":[142],"CRM.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
