Academic literature on the topic 'Software Supply Chain Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software Supply Chain Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software Supply Chain Attacks"
Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Full textКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Full textWatney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Full textKaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Full textChetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed, and Mustafa M. Kadhim. "Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors." Foundations of Computing and Decision Sciences 47, no. 4 (December 1, 2022): 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.
Full textZhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (April 1, 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.
Full textTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Full textJohnson, Chris, and Maria Evangelopoulou. "Defending Against Firmware Cyber Attacks on Safety-Critical Systems." Journal of System Safety 54, no. 1 (April 1, 2018): 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.
Full textLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Full textShinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Full textDissertations / Theses on the topic "Software Supply Chain Attacks"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Full textRueda, Guerrero María Ximena. "Robustness of complex supply chain networks to targeted attacks." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119719.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 65-67).
In this thesis, we study the robustness of complex supply chain systems from a network science perspective. Through the simulation of targeted attacks to nodes and edges using different hierarchical measures from network science to select the most relevant components, we evaluate the extent to which local centrality measures can estimate the relevance of a node in maintaining the connectivity and the efficient communication across the network. We perform the experiments on two real-world supply chain data sets, and on an ensemble of networks generated from network growth models that share simple topological properties with the real-world networks. It is found that all models produce more robust networks than the data sets of choice. In addition, the removal of high average neighbor degree nodes seems to have little impact on the connectivity of the network, and a highly varying impact on the efficiency of the network. Finally, robustness against targeted node and edge removal is found to be more associated to the number of nodes and links in the network than to more complex network measures such as the degree distribution.
by María Ximena Rueda Guerrero.
M. Eng.
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Full textIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Sheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Full textIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Tan, Chow Yin 1973. "Supply-chain software systems : current issues and imperatives in selection and implementation." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.
Full textRouse, Vicki Henderson. "An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.
Full textArunachalam, Raghu. "An agent based compositional framework for supply chain simulation." Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.
Full textBredenkamp, Frederick van Biljon. "The development of a generic just-in-time supply chain optimisation software tool /." Link to the online version, 2005. http://hdl.handle.net/10019/980.
Full textBredenkamp, F. v. B. "The development of a generic just-in-time supply chain optimisation software tool." Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.
Full textPippow, Ingo. "Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten /." Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.
Full textBooks on the topic "Software Supply Chain Attacks"
Enterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Find full textStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
Find full textHartmut, Stadtler, and Kilger Christoph 1965-, eds. Supply chain management and advanced planning: Concepts, models, software, and case studies. 2nd ed. Berlin ; New York: Springer, 2002.
Find full textStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
Find full textValverde, Raul. Information systems reengineering for modern business systems: ERP, supply chain and e-commerce management solutions. Hershey, PA: Information Science Reference, 2012.
Find full textKang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control: Method, Software and Industrial Application. London: Springer London, 2013.
Find full textLuo, Zongwei. Mechanism Design for Sustainability: Techniques and Cases. Dordrecht: Springer Netherlands, 2013.
Find full textKovalenko, Vladimir. Design of information systems. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/987869.
Full textDisclosure of Software Supply Chain Risks. RAND Corporation, 2022. http://dx.doi.org/10.7249/pea2072-1.
Full textBook chapters on the topic "Software Supply Chain Attacks"
Ohm, Marc, Henrik Plate, Arnold Sykosch, and Michael Meier. "Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment, 23–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_2.
Full textQuante, Rainer, Herbert Meyr, and Moritz Fleischmann. "Revenue management and demand fulfillment: matching applications, models and software." In Supply Chain Planning, 57–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-93775-3_3.
Full textGuillén-Gosálbez, Gonzalo, and Fengqi You. "Plant Location: Supply Chain Management." In Introduction to Software for Chemical Engineers, 669–80. Second edition. | Boca Raton, FL: CRC Press/Taylor & Francis: CRC Press, 2019. http://dx.doi.org/10.1201/9780429451010-16.
Full textBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO." In Integriertes Supply Chain Management, 235–59. Wiesbaden: Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-663-10380-6_12.
Full textBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO." In Integriertes Supply Chain Management, 259–83. Wiesbaden: Gabler Verlag, 2004. http://dx.doi.org/10.1007/978-3-663-10381-3_13.
Full textMüller, Jörg P., Bernhard Bauer, Thomas Friese, Stephan Roser, and Roland Zimmermann. "Software Agents for Electronic Business: Opportunities and Challenges (2005 Re-mix)." In Multiagent based Supply Chain Management, 63–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33876-5_3.
Full textHanne, Thomas, and Rolf Dornberger. "Intelligent Software for Logistics." In Computational Intelligence in Logistics and Supply Chain Management, 153–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40722-7_7.
Full textHanne, Thomas, and Rolf Dornberger. "Intelligente Software für die Logistik." In Computational Intelligence in Logistik und Supply Chain Management, 163–80. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21452-3_7.
Full textKortus-Schultes, Doris, and Ute Ferfer. "Beschleunigungsfaktoren im Management von Supply Chains: Software-Werkzeuge." In Logistik und Marketing in der Supply Chain, 77–79. Wiesbaden: Gabler Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-82301-4_8.
Full textEspinoza-Mejía, Mauricio, Víctor Saquicela, and Victoria Abril-Ulloa. "Ensuring Traceability and Orchestration in the Food Supply Chain." In Artificial Intelligence, Computer and Software Engineering Advances, 135–49. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68080-0_10.
Full textConference papers on the topic "Software Supply Chain Attacks"
Hossain Faruk, Md Jobair, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, and Fan Wu. "Investigating Novel Approaches to Defend Software Supply Chain Attacks." In 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2022. http://dx.doi.org/10.1109/issrew55968.2022.00081.
Full textWang, Xinyuan. "On the Feasibility of Detecting Software Supply Chain Attacks." In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9652901.
Full textOhm, Marc, Arnold Sykosch, and Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Full textVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate, and Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Full textCoram, Michael. "Anatomy of a Software Supply Chain Attack." In Proposed for presentation at the NLIT Summit 2020 held October 13-16, 2020 in virtual, virtual, virtual. US DOE, 2020. http://dx.doi.org/10.2172/1825030.
Full textMasum, Mohammad, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, et al. "Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?" In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00097.
Full textYan, Dapeng, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu, and Tegawende F. Bissyande. "Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain." In 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2021. http://dx.doi.org/10.1109/qrs54544.2021.00060.
Full textCoufalikova, Aneta, Ivo Klaban, and Tomas Slajs. "Complex strategy against supply chain attacks." In 2021 International Conference on Military Technologies (ICMT). IEEE, 2021. http://dx.doi.org/10.1109/icmt52455.2021.9502768.
Full textSingi, Kapil, Jagadeesh Chandra Bose R P, Sanjay Podder, and Adam P. Burden. "Trusted Software Supply Chain." In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2019. http://dx.doi.org/10.1109/ase.2019.00141.
Full textLudvigsen, Kaspar Rosager, Shishir Nagaraja, and Angela Daly. "Preventing or Mitigating Adversarial Supply Chain Attacks." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564552.
Full textReports on the topic "Software Supply Chain Attacks"
Visker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada378230.
Full textChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), November 2016. http://dx.doi.org/10.2172/1329799.
Full textChandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Full textLindquist, Joachim, and Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.
Full textHicks, Julie, Laurin Yates, and Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41867.
Full textCoyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers. SAE International, March 2022. http://dx.doi.org/10.4271/epr2022008.
Full text