{"id":"https://openalex.org/W4406612651","doi":"https://doi.org/10.1109/wsc63780.2024.10838999","title":"Optimizing Cyber-Resilience in Critical Infrastructure Networks","display_name":"Optimizing Cyber-Resilience in Critical Infrastructure Networks","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406612651","doi":"https://doi.org/10.1109/wsc63780.2024.10838999"},"language":"en","primary_location":{"id":"doi:10.1109/wsc63780.2024.10838999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wsc63780.2024.10838999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Winter Simulation Conference (WSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101533401","display_name":"Ranjan Pal","orcid":"https://orcid.org/0000-0003-2791-4606"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ranjan Pal","raw_affiliation_strings":["MIT Sloan School of Management Massachusetts Institute of Technology,USA"],"affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management Massachusetts Institute of Technology,USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017786725","display_name":"Rohan Xavier Sequeira","orcid":"https://orcid.org/0000-0003-3433-5725"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rohan Xavier Sequeira","raw_affiliation_strings":["Electrical and Computer Engineering University of Southern California,USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering University of Southern California,USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115947441","display_name":"Sander Zeijlmaker","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sander Zeijlmaker","raw_affiliation_strings":["MIT Sloan School of Management Massachusetts Institute of Technology,USA"],"affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management Massachusetts Institute of Technology,USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077262186","display_name":"Michael Siegel","orcid":"https://orcid.org/0000-0002-2573-9616"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Siegel","raw_affiliation_strings":["MIT Sloan School of Management Massachusetts Institute of Technology,USA"],"affiliations":[{"raw_affiliation_string":"MIT Sloan School of Management Massachusetts Institute of Technology,USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101533401"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.3488,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64175004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"774","last_page":"785"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9812999963760376,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.7831804752349854},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.782887876033783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6459988355636597},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.356815367937088}],"concepts":[{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.7831804752349854},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.782887876033783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6459988355636597},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.356815367937088},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wsc63780.2024.10838999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wsc63780.2024.10838999","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 Winter Simulation Conference (WSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1424318399","https://openalex.org/W1501426775","https://openalex.org/W1508221334","https://openalex.org/W1971121269","https://openalex.org/W1977548549","https://openalex.org/W2014770087","https://openalex.org/W2046213250","https://openalex.org/W2048728386","https://openalex.org/W2061820396","https://openalex.org/W2064598213","https://openalex.org/W2079354925","https://openalex.org/W2156264138","https://openalex.org/W2160265998","https://openalex.org/W2342927499","https://openalex.org/W2604840600","https://openalex.org/W2618370510","https://openalex.org/W2768883215","https://openalex.org/W2805130487","https://openalex.org/W2907246320","https://openalex.org/W2961413914","https://openalex.org/W2962779619","https://openalex.org/W2974694213","https://openalex.org/W2990327145","https://openalex.org/W3122768207","https://openalex.org/W3133503767","https://openalex.org/W3134520564","https://openalex.org/W3174427608","https://openalex.org/W3209282338","https://openalex.org/W4240226086"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2493741781","https://openalex.org/W4286492231","https://openalex.org/W4242728933","https://openalex.org/W2493430149","https://openalex.org/W2715935450","https://openalex.org/W4362684337","https://openalex.org/W4385250032","https://openalex.org/W2767924451","https://openalex.org/W3088911518"],"abstract_inverted_index":{"With":[0],"the":[1,47,58,147],"expanding":[2],"cyber-risk":[3],"terrain":[4],"spanning":[5],"business":[6,41],"processes":[7,34],"in":[8,18,46,104,140,146],"digitally":[9],"driven":[10],"enterprises":[11,54],"with":[12,79,107,142],"critical":[13,75],"infrastructure,":[14],"it":[15],"is":[16,112],"inevitable":[17],"time":[19],"that":[20,92],"system":[21],"process":[22,81],"continuity":[23],"(SPC)":[24],"will":[25],"be":[26],"affected":[27],"(e.g.,":[28],"via":[29,63,87],"ransomware)":[30],"for":[31,71],"certain":[32],"inter-dependent":[33,110],"of":[35,52],"such":[36,53],"an":[37,68,88],"enterprise,":[38],"and":[39,65,109],"hamper":[40],"continuity.":[42],"We":[43,85],"are":[44],"interested":[45],"question:":[48],"how":[49],"should":[50],"managers":[51],"optimize":[55],"cyber-resilience":[56,97,127],"(i.e.,":[57],"ability":[59],"to":[60,67,124],"maintain":[61],"SPC":[62],"absorbing":[64],"adapting":[66],"adverse":[69],"cyber-incident)":[70],"any":[72,105,129],"complex":[73],"networked":[74,108],"infrastructure":[76],"(CI)":[77],"(sub-)system":[78],"multiple":[80],"functionality":[82],"components":[83],"(PFCs)?":[84],"prove":[86],"algorithmic":[89],"graph-theoretic":[90],"approach":[91],"optimizing":[93,96],"or":[94],"approximately":[95],"within":[98,128],"a":[99,117,134],"pre-specified":[100],"enterprise":[101],"cyber-protection":[102,136],"budget":[103,137],"CI":[106],"PFCs":[111,139],"NP-hard.":[113],"Consequently,":[114],"we":[115],"propose":[116],"computationally":[118],"tractable":[119],"graph-based":[120],"Monte-Carlo":[121],"simulation":[122],"framework":[123],"\u2018optimize\u2019":[125],"(boost)":[126],"PFC":[130,148],"network":[131],"by":[132],"allocating":[133],"constrained":[135],"among":[138],"accordance":[141],"their":[143],"Katz":[144],"centralities":[145],"network.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
