Journal articles on the topic 'Software Supply Chain Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software Supply Chain Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Full textКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Full textWatney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Full textKaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Full textChetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed, and Mustafa M. Kadhim. "Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors." Foundations of Computing and Decision Sciences 47, no. 4 (December 1, 2022): 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.
Full textZhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (April 1, 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.
Full textTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Full textJohnson, Chris, and Maria Evangelopoulou. "Defending Against Firmware Cyber Attacks on Safety-Critical Systems." Journal of System Safety 54, no. 1 (April 1, 2018): 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.
Full textLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Full textShinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Full textKajtez, Nemanja, Yue Zhang, and Basel Halak. "Lockit: A Logic Locking Automation Software." Electronics 10, no. 22 (November 17, 2021): 2817. http://dx.doi.org/10.3390/electronics10222817.
Full textPaul, Shubhra Deb, and Swarup Bhunia. "SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–28. http://dx.doi.org/10.1145/3460232.
Full textSeth, Dinesh, Nitin Seth, and Deepak Goel. "Application of value stream mapping (VSM) for minimization of wastes in the processing side of supply chain of cottonseed oil industry in Indian context." Journal of Manufacturing Technology Management 19, no. 4 (May 2, 2008): 529–50. http://dx.doi.org/10.1108/17410380810869950.
Full textZhao, Guangwei, and Kaveh Shamsi. "Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation." Cryptography 6, no. 4 (November 22, 2022): 60. http://dx.doi.org/10.3390/cryptography6040060.
Full textDeyannis, Dimitris, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos, and Sotiris Ioannidis. "The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains." Electronics 11, no. 13 (June 22, 2022): 1944. http://dx.doi.org/10.3390/electronics11131944.
Full textDuan, Wei, Xuelin Li, Desheng Xu, Hui Ma, Fu Sai, and Xi Lian. "ECONOMIC PSYCHOLOGY ANALYSIS OF RECYCLERS' EMOTIONAL STABILITY IN CLOSED-LOOP SUPPLY CHAIN UNDER UNCERTAINTY." International Journal of Neuropsychopharmacology 25, Supplement_1 (July 1, 2022): A55—A56. http://dx.doi.org/10.1093/ijnp/pyac032.077.
Full textLiu, Yang, Yang Zhang, Yongsheng Yang, and Yan Ma. "DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading." Systems 10, no. 6 (November 19, 2022): 226. http://dx.doi.org/10.3390/systems10060226.
Full textKannan, R. Rajesh, and S. Vasantha. "COVID 19 Outbreaks on the Growth of Self Servicing Technology Using Digital Payments." Webology 18, no. 2 (December 23, 2021): 22–40. http://dx.doi.org/10.14704/web/v18i2/web18305.
Full textBuchicchio, Emanuele, Luca Grilli, Eros Capobianco, Salvatore Cipriano, and Diego Antonini. "Invisible Supply Chain Attacks Based on Trojan Source." Computer 55, no. 10 (October 2022): 18–25. http://dx.doi.org/10.1109/mc.2022.3190801.
Full textYudina, Tamara N., Petr S. Lemeshchenko, and Elena V. Kupchishina. "Features of New Institutions in The Digital Economy." Journal of Institutional Studies 14, no. 3 (September 25, 2022): 031–45. http://dx.doi.org/10.17835/2076-6297.2022.14.3.031-045.
Full textLevy, E. "Poisoning the software supply chain." IEEE Security & Privacy 1, no. 3 (May 2003): 70–73. http://dx.doi.org/10.1109/msecp.2003.1203227.
Full textBall, Michael O., Meng Ma, Louiqa Raschid, and Zhengying Zhao. "Supply chain infrastructures." ACM SIGMOD Record 31, no. 1 (March 2002): 61–66. http://dx.doi.org/10.1145/507338.507350.
Full textAl-Farsi, Sana, Halima Bensmail, and Spiridon Bakiras. "Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks." Machines 10, no. 6 (May 31, 2022): 431. http://dx.doi.org/10.3390/machines10060431.
Full textMukhsin, Moh, HER Taufik, Asep Ridwan, and Tulus Suryanto. "The mediation role of supply chain agility on supply chain orientation-supply chain performance link." Uncertain Supply Chain Management 10, no. 1 (2022): 197–204. http://dx.doi.org/10.5267/j.uscm.2021.9.008.
Full textWarren, Matthew, and William Hutchinson. "Cyber attacks against supply chain management systems: a short note." International Journal of Physical Distribution & Logistics Management 30, no. 7/8 (September 2000): 710–16. http://dx.doi.org/10.1108/09600030010346521.
Full textWang, Ge, Shouqian Shi, Minmei Wang, Chen Qian, Cong Zhao, Han Ding, Wei Xi, and Jizhong Zhao. "RF-Chain." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (December 21, 2022): 1–28. http://dx.doi.org/10.1145/3569493.
Full textKshetri, Nir, and Jeffrey Voas. "Supply Chain Trust." IT Professional 21, no. 2 (March 1, 2019): 6–10. http://dx.doi.org/10.1109/mitp.2019.2895423.
Full textKarmanov, V. S., B. S. Solov’ev, and V. Yu Shсhekoldin. "SOFTWARE DEVELOPMENT FOR SUPPLY CHAIN INTERACTION MODELING." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 186 (December 2019): 18–26. http://dx.doi.org/10.14489/vkit.2019.12.pp.018-026.
Full textWirth, Axel. "Cyberinsights: Talking about the Software Supply Chain." Biomedical Instrumentation & Technology 54, no. 5 (September 1, 2020): 364–67. http://dx.doi.org/10.2345/0899-8205-54.5.364.
Full textVerwijmeren, Martin. "Software component architecture in supply chain management." Computers in Industry 53, no. 2 (February 2004): 165–78. http://dx.doi.org/10.1016/j.compind.2003.07.004.
Full textFajar, Ahmad Nurul, Ditdit Nugeraha Utama, and Gunawan Wang. "Intelligent Software Product Line For Supply Chain." Journal of Physics: Conference Series 1090 (September 2018): 012043. http://dx.doi.org/10.1088/1742-6596/1090/1/012043.
Full textFavilla, Jose, and Andrew Fearne. "Supply chain software implementations: getting it right." Supply Chain Management: An International Journal 10, no. 4 (September 1, 2005): 241–43. http://dx.doi.org/10.1108/13598540510612695.
Full textAslam, Haris, Abdul Qadeer Khan, Kamran Rashid, and Saif-ur Rehman. "Achieving supply chain resilience: the role of supply chain ambidexterity and supply chain agility." Journal of Manufacturing Technology Management 31, no. 6 (April 24, 2020): 1185–204. http://dx.doi.org/10.1108/jmtm-07-2019-0263.
Full textYeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (March 5, 2019): 63. http://dx.doi.org/10.3390/fi11030063.
Full textEL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 1 (January 2001): 48. http://dx.doi.org/10.1177/003754970107600107.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 2 (February 2001): 121. http://dx.doi.org/10.1177/003754970107600216.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 3 (March 2001): 186. http://dx.doi.org/10.1177/003754970107600308.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 4 (April 2001): 241. http://dx.doi.org/10.1177/003754970107600410.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 5 (May 2001): 307. http://dx.doi.org/10.1177/003754970107600518.
Full textBruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 77, no. 3-4 (September 2001): 155. http://dx.doi.org/10.1177/003754970107700309.
Full textDavidson, Rebecca K., Wilson Antunes, Elisabeth H. Madslien, José Belenguer, Marco Gerevini, Tomas Torroba Perez, and Raffaello Prugger. "From food defence to food supply chain integrity." British Food Journal 119, no. 1 (January 3, 2017): 52–66. http://dx.doi.org/10.1108/bfj-04-2016-0138.
Full textGorane, S. J., and Ravi Kant. "Supply chain practices." Benchmarking: An International Journal 23, no. 5 (July 4, 2016): 1076–110. http://dx.doi.org/10.1108/bij-06-2014-0059.
Full textMcGregor, John D. "The Weak Link in the Supply Chain." Journal of Object Technology 3, no. 8 (2004): 71. http://dx.doi.org/10.5381/jot.2004.3.8.c7.
Full textPrestifilippo, Giovanni. "Resilienz für die Supply Chain." Logistik für Unternehmen 35, no. 09-10 (2021): 39–41. http://dx.doi.org/10.37544/0930-7834-2021-09-10-39.
Full textCao, Cheng Xuan, Chong Ling Ren, Wen Wen Shi, and Jing Li. "A Study on Supply Chain Management of Software-Focused Products." Applied Mechanics and Materials 66-68 (July 2011): 995–1000. http://dx.doi.org/10.4028/www.scientific.net/amm.66-68.995.
Full textTarigan, Zeplin Jiwa Husada, Hotlan Siagian, and Ferry Jie. "Impact of Internal Integration, Supply Chain Partnership, Supply Chain Agility, and Supply Chain Resilience on Sustainable Advantage." Sustainability 13, no. 10 (May 13, 2021): 5460. http://dx.doi.org/10.3390/su13105460.
Full textSoto-Valero, Cesar, Martin Monperrus, and Benoit Baudry. "The Multibillion Dollar Software Supply Chain of Ethereum." Computer 55, no. 10 (October 2022): 26–34. http://dx.doi.org/10.1109/mc.2022.3175542.
Full textSebastian, Kot, and Ślusarczyk Beata. ""Process Simulation In Supply Chain Using Logware Software "." Annales Universitatis Apulensis Series Oeconomica 2, no. 11 (December 31, 2009): 932–37. http://dx.doi.org/10.29302/oeconomica.2009.11.2.37.
Full textTucci, Christopher L., Allen Kaufman, Craig H. Wood, and Gregory Theyel. "Collaboration and Teaming in the Software Supply Chain." Supply Chain Forum: An International Journal 6, no. 2 (January 2005): 16–28. http://dx.doi.org/10.1080/16258312.2005.11517144.
Full text