{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:09:57Z","timestamp":1763748597493,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030971236"},{"type":"electronic","value":"9783030971243"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97124-3_23","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:16:56Z","timestamp":1648646216000},"page":"284-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modelling Organizational Recovery"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Baldwin","sequence":"first","affiliation":[]},{"given":"Tristan","family":"Caulfield","sequence":"additional","affiliation":[]},{"given":"Marius-Constantin","family":"Ilau","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.tcs.2015.11.035","volume":"614","author":"G Anderson","year":"2016","unstructured":"Anderson, G., Pym, D.: A calculus and logic of bunched resources and processes. Theoret. Comput. Sci. 614, 63\u201396 (2016)","journal-title":"Theoret. Comput. Sci."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-1-4614-1981-5_10","volume-title":"Economics of Information Security and Privacy III","author":"A Baldwin","year":"2013","unstructured":"Baldwin, A., Beres, Y., Duggan, G.B., Mont, M.C., Johnson, H., Middup, C., Shiu, S.: Economic methods and decision making by security professionals. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 213\u2013238. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1981-5_10"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D., Ventura, P.: Analysing the performance of security solutions to reduce vulnerability exposure window. In: 2008 Annual Computer Security Applications Conference (ACSAC), pp. 33\u201342 (2008)","DOI":"10.1109\/ACSAC.2008.42"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Beresnevichiene, Y., Pym, D., Shiu, S.: Decision support for systems security investment. In: 2010 IEEE\/IFIP Network Operations and Management Symposium Workshops, pp. 118\u2013125 (2010)","DOI":"10.1109\/NOMSW.2010.5486590"},{"key":"23_CR5","unstructured":"Binary Defense: Emotet Evolves With new Wi-Fi Spreader (2020). https:\/\/www.binarydefense.com\/emotet-evolves-with-new-wi-fi-spreader\/. Accessed 28 June 2021"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Birtwistle, G.: Demos\u2014Discrete Event Modelling on Simula. Macmillan (1979)","DOI":"10.1007\/978-1-4899-6685-8"},{"key":"23_CR7","unstructured":"[blinded]: SysModels Julia Package. Accessed 10 May 2021"},{"key":"23_CR8","unstructured":"Bromiley, M.: SANS 2019 Incident Response(IR) Survey: It\u2019s Time for aChange. SANS (2012). https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/2019-incident-response-ir-survey-time-change-39070. Accessed 28 June 2021"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Caulfield, T., Pym, D.: Modelling and simulating systems security policy. In: Proceedings of SimuTools (2015)","DOI":"10.4108\/eai.24-8-2015.2260765"},{"key":"23_CR10","unstructured":"cisa: Emotet Malware (2017). https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-280a. Accessed 28 June 2021"},{"key":"23_CR11","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Math. Systems Modelling. College Publns (2012)"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1017\/S0960129509990077","volume":"19","author":"M Collinson","year":"2009","unstructured":"Collinson, M., Pym, D.: Algebra and logic for resource-based systems modelling. Math. Struct. Comput. Sci. 19, 959\u20131027 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"key":"23_CR13","unstructured":"Dietz, G., Gillespie, N.: Recovery of trust: case studies of organisational failures and trust repair, vol. 5. Institute of Business Ethics London (2012)"},{"key":"23_CR14","unstructured":"Parizo, E.: Maersk CISO Says NotPeyta Devastated Several Unnamed US firms (2019). https:\/\/www.darkreading.com\/threat-intelligence\/maersk-ciso-says-notpeyta-devastated-several-unnamed-us-firms\/a\/d-id\/1336558?page_number=2. Accessed 28 June 2021"},{"issue":"3","key":"23_CR15","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1016\/j.ifacol.2015.06.392","volume":"48","author":"EM Frazzon","year":"2015","unstructured":"Frazzon, E.M., Silva, L.S., Hurtado, P.A.: Synchronizing and improving supply chains through the application of cyber-physical systems. IFAC-PapersOnLine 48(3), 2059\u20132064 (2015)","journal-title":"IFAC-PapersOnLine"},{"key":"23_CR16","unstructured":"Gelenbe, E., Wang, Y.: Modelling the impact of cyber-attacks on web based sales (2019, Submitted for Publication)"},{"key":"23_CR17","unstructured":"Gibbs, M.: Your top it hates. Netw. World Canada 24(8), N_A (2008)"},{"key":"23_CR18","unstructured":"Greenburg, A.: The Untold Story of NotPetya, the Most Devastating Cyberattack in History (2018). https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/. Accessed 28 June 2021"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-10003-2_79","volume-title":"Automata, Languages and Programming","author":"M Hennessy","year":"1980","unstructured":"Hennessy, M., Milner, R.: On observing nondeterminism and concurrency. In: de Bakker, J., van Leeuwen, J. (eds.) ICALP 1980. LNCS, vol. 85, pp. 299\u2013309. Springer, Heidelberg (1980). https:\/\/doi.org\/10.1007\/3-540-10003-2_79"},{"key":"23_CR20","unstructured":"Hewlett-Packard Laboratories: Security Analytics. https:\/\/www.hpl.hp.com\/news\/2011\/oct-dec\/security_analytics.html. Accessed 10 May 2021"},{"key":"23_CR21","unstructured":"HP: HP SureRecover. HP (2021). https:\/\/www8.hp.com\/h20195\/v2\/GetPDF.aspx\/4AA7-4556ENW.pdf. Accessed 28 June 2021"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Ishtiaq, S., O\u2019Hearn, P.: BI as an assertion language for mutable data structures. In: Proceedings of POPL (2001)","DOI":"10.1145\/360204.375719"},{"issue":"10","key":"23_CR23","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.1016\/j.compchemeng.2004.06.006","volume":"28","author":"JY Jung","year":"2004","unstructured":"Jung, J.Y., Blau, G., Pekny, J.F., Reklaitis, G.V., Eversdyk, D.: A simulation based optimization approach to supply chain management under demand uncertainty. Comput. Chem. Eng. 28(10), 2087\u20132106 (2004)","journal-title":"Comput. Chem. Eng."},{"key":"23_CR24","unstructured":"Kral, P.: The Incident Handlers Handbook. SANS (2012). https:\/\/www.sans.org\/reading-room\/whitepapers\/incident\/incident-handlers-handbook-33901. Accessed 28 June 2021"},{"key":"23_CR25","unstructured":"LogRhythm Labs: A Technical Analysis of WannaCry Ransomware (2017). https:\/\/logrhythm.com\/blog\/a-technical-analysis-of-wannacry-ransomware\/. Accessed 28 June 2021"},{"key":"23_CR26","unstructured":"Lynch, N.A., Tuttle, M.R.: An introduction to input\/output automata. CWI Quart. 2, 219\u2013246 (1989)"},{"key":"23_CR27","unstructured":"Microsoft: Windows Recovery Environment (Windows RE). Microsoft (2017). https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/manufacture\/desktop\/windows-recovery-environment-windows-re-technical-reference. Accessed 28 June 2021"},{"key":"23_CR28","unstructured":"Microsoft: Apply features and settings on your devices using device profiles in Microsoft Intune. Microsoft (2020). https:\/\/docs.microsoft.com\/en-us\/mem\/intune\/configuration\/device-profiles. Accessed 28 June 2021"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Microsoft: Microsoft Digital Defense Report - Sept 2020. Microsoft (2020), https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWxPuf\/. Accessed 08 Aug 2021","DOI":"10.1016\/S1353-4858(20)30114-8"},{"key":"23_CR30","unstructured":"Microsoft: Deploy Windows 10 using PXE and Configuration Manager. Microsoft (2021). https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/deploy-windows-cm\/deploy-windows-10-using-pxe-and-configuration-manager. Accessed 28 June 2021"},{"key":"23_CR31","unstructured":"Microsoft: Microsoft Deployment Toolkit. Microsoft (2021). https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/deploy-windows-mdt\/get-started-with-the-microsoft-deployment-toolkit. Accessed 28 June 2021"},{"key":"23_CR32","unstructured":"Microsoft: Overview of Windows Autopilot. Microsoft (2021). https:\/\/docs.microsoft.com\/en-us\/mem\/autopilot\/windows-autopilot. Accessed 28 June 2021"},{"issue":"3","key":"23_CR33","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25","author":"R Milner","year":"1983","unstructured":"Milner, R.: Calculi for synchrony and asynchrony. Theor. Comput. Sci. 25(3), 267\u2013310 (1983)","journal-title":"Theor. Comput. Sci."},{"key":"23_CR34","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice Hall, New York (1989)"},{"key":"23_CR35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626661","volume-title":"The Space and Motion of Communicating Agents","author":"R Milner","year":"2009","unstructured":"Milner, R.: The Space and Motion of Communicating Agents. Cambridge University Press, Cambridge (2009)"},{"key":"23_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/3-540-45832-8_3","volume-title":"Graph Transformation","author":"R Milner","year":"2002","unstructured":"Milner, R.: Bigraphs as a model for mobile interaction. In: Corradini, A., Ehrig, H., Kreowski, H.-J., Rozenberg, G. (eds.) ICGT 2002. LNCS, vol. 2505, pp. 8\u201313. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45832-8_3"},{"issue":"1\u20133","key":"23_CR37","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.tcs.2006.12.035","volume":"375","author":"P O\u2019Hearn","year":"2007","unstructured":"O\u2019Hearn, P.: Resources, concurrency, and local reasoning. Theor. Comput. Sci. 375(1\u20133), 271\u2013307 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"23_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44802-0_1","volume-title":"Computer Science Logic","author":"P O\u2019Hearn","year":"2001","unstructured":"O\u2019Hearn, P., Reynolds, J., Yang, H.: Local reasoning about programs that alter data structures. In: Fribourg, L. (ed.) CSL 2001. LNCS, vol. 2142, pp. 1\u201319. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44802-0_1"},{"issue":"2","key":"23_CR39","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3326938.3326940","volume":"6","author":"D Pym","year":"2019","unstructured":"Pym, D.: Resource semantics: logic as a modelling technology. ACM SIGLOG News 6(2), 5\u201341 (2019). https:\/\/doi.org\/10.1145\/3326938.3326940","journal-title":"ACM SIGLOG News"},{"key":"23_CR40","unstructured":"Report, T.D.: Ryuk in 5 Hours. The DFIR Report (2020). https:\/\/thedfirreport.com\/2020\/10\/18\/ryuk-in-5-hours\/. Accessed 08 Aug 2021"},{"key":"23_CR41","unstructured":"Reynolds, J.: Separation logic: a logic for shared mutable data structures. In: Proceedings of LICS (2002)"},{"key":"23_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1827-3","volume-title":"Windows Installation and Update Troubleshooting","author":"C Rhodes","year":"2016","unstructured":"Rhodes, C., Bettany, A.: Windows Installation and Update Troubleshooting. Apress, New York (2016)"},{"key":"23_CR43","unstructured":"Hurley, S., Sood, K.: NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery (2017). https:\/\/www.crowdstrike.com\/blog\/petrwrap-technical-analysis-part-2-further-findings-and-potential-for-mbr-recovery\/. Accessed 28 June 2021"},{"key":"23_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3550-5","volume-title":"Modal and Temporal Properties of Processes","author":"C Stirling","year":"2001","unstructured":"Stirling, C.: Modal and Temporal Properties of Processes. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/978-1-4757-3550-5"},{"issue":"5","key":"23_CR45","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2015.97","volume":"13","author":"T Caulfield","year":"2015","unstructured":"Caulfield, T., Pym, D.: Improving security policy decisions with models. IEEE Secur. Priv. 13(5), 34\u201341 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"23_CR46","unstructured":"M.D.T.I. Team: Human-operated ransomware attacks: a preventable disaster. Microsoft (2021). https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/. Accessed 08 Aug 2021"},{"key":"23_CR47","doi-asserted-by":"crossref","unstructured":"Tweneboah-Kodua, S., Atsu, F., Buchanan, W.: Impact of cyberattacks on stock performance: a comparative study. Inf. Comput. Secur. (2018)","DOI":"10.1108\/ICS-05-2018-0060"},{"key":"23_CR48","unstructured":"Vynck, G.D., Lerman, R., Nakashima, E., Alcantara, C.: The anatomy of a ransomware attack. Washington Post (2021). https:\/\/www.washingtonpost.com\/technology\/2021\/07\/09\/how-ransomware-attack-works\/?itid=mr_innovations_1. Accessed 08 Aug 2021"},{"key":"23_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45931-6_28","volume-title":"Foundations of Software Science and Computation Structures","author":"H Yang","year":"2002","unstructured":"Yang, H., O\u2019Hearn, P.: A semantic basis for local reasoning. In: Nielsen, M., Engberg, U. (eds.) FoSSaCS 2002. LNCS, vol. 2303, pp. 402\u2013416. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45931-6_28"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97124-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:47:38Z","timestamp":1648648058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97124-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030971236","9783030971243"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97124-3_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}