Journal articles on the topic 'Software Supply Chain Attacks'

To see the other types of publications on this topic, follow the link: Software Supply Chain Attacks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software Supply Chain Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.

Full text
Abstract:
Exploitation of a vulnerability that compromised the source code of the Solar Winds’ Orion system, a software that is used widely by different government and industry actors in the world for the administration and monitoring of networks; brought to the fore a type of stealth attack that has been gaining momentum: supply chain attacks. The main problem in the violation of the software supply chain is that, from 85% to 97% of the code currently used in the software development industry comes from the reuse of open source code frameworks, repositories of third-party software and APIs, creating potential vulnerabilities in the development cycle of a software product. This research analyzes the SolarWinds case study from an exploratory review of academic literature, government information, but also from the articles and reports that are published by different cybersecurity consulting firms and software providers. Then, a set of good practices is proposed such as: Zero trust, Multi-Factor authentication mechanisms (MFA), strategies such as SBOM and the recommendations of the CISA guide to defend against this type of attack. Finally, the research discusses about how to improve response times and prevention against this type of attacks, also future research related to the subject is suggested, such as the application of Machine Learning and Blockchain technologies. Additionally for risk reduction, in addition to the management and articulation of IT teams that participate in all the actors that are part of the software life cycle under a DevSecOps approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Куликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.

Full text
Abstract:
В данной статье представлен анализ угроз информационной безопасности, связанных с атаками на цепи поставок, которые могут использоваться для нарушения информационной безопасности организации без прямых воздействий на ее информационно-технологическую инфраструктуру. В контексте информационной безопасности, атака на цепь поставки предполагает целенаправленные злоумышленные воздействия на активы поставщика с целью последующего нарушения информационной безопасности потребителя. Этот тип атак сегодня приобретает особую актуальность как наиболее эффективный среди всего множества угроз информационной безопасности ввиду принципиальных особенностей, существенно затрудняющих противодействие им: возможность злоумышленника по выбору наиболее незащищенного элемента для атаки, необходимость координации действий нескольких организационных структур для противодействия таким атакам, устранения последствий от их реализации и расследования их причин. Также приведен анализ научной, методической и технической литературы, описывающей сценарии известных атак на цепи поставок программного и аппаратного обеспечения. This article presents an analysis of information security threats associated with attacks on the supply chain, which can be used to violate the information security of an organization without direct impacts on its information technology infrastructure. In the context of information security, an attack on the supply chain involves targeted malicious impacts on the supplier's assets with the aim of further violating the consumer's information security. This type of attacks is becoming particularly relevant today as the most effective among all the many threats to information security due to the fundamental features that significantly complicate countering them: the possibility of choosing the most unprotected element of the chain for an attack, the need to coordinate the actions of several organizational structures to counter such attacks, eliminate the consequences of their implementation and investigate their causes. The analysis of scientific, methodological and technical literature describing scenarios of known attacks on the supply chain of software and hardware is also given.
APA, Harvard, Vancouver, ISO, and other styles
3

Watney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Full text
Abstract:
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks. Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent. Connectivity brings about the risk of a cyberattack, demonstrated by the 2021 Colonial Pipeline ransomware attack. Interconnectedness also means that the compromise of one critical infrastructure asset can have a domino effect that degrades or disrupts others and results in cascading consequences across the economy and national security. Operational continuity is essential and this may have been one of the reasons why Colonial Pipeline paid a ransom to cyber-attackers. A cyberattack on the critical infrastructure of a state cannot be seen in isolation as the consequences of the attack may impact other states, this was illustrated by the 2017 WannaCry and NotPetya ransomware attacks. The level of sophistication of cyberattacks has increased over the years as shown by the 2020 SolarWinds software supply chain attack. The escalation of attacks has served as a catalyst for governments to address the risk to critical infrastructure. Countries need to have strong government bodies which supervise cybersecurity in their country and work together with their counterparts in other countries by sharing information regarding threats and attacks against critical infrastructure. The discussion focuses on the challenges that threats to and attacks on critical infrastructure present, the possible solutions a government may implement in addressing cyberattacks on critical infrastructure and the accountability of state and non-state actors of cyberattacks on critical infrastructure. The issues are discussed from a legal perspective.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.

Full text
Abstract:
While enterprise security teams naturally tend to turn their focus primarily to direct attacks on their own infrastructure, cybercrime exploits now are increasingly aimed at easier targets upstream. This has led to a perfect storm, since virtually all significant codebase repositories at this point include at least some amount of open-source software. But opportunities also abound there for the authors of malware. The broader cybercrime world, meanwhile, has noted that open-source supply chains are generally easy to penetrate. What's being done at this point to address the apparent risks?
APA, Harvard, Vancouver, ISO, and other styles
5

Chetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed, and Mustafa M. Kadhim. "Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors." Foundations of Computing and Decision Sciences 47, no. 4 (December 1, 2022): 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.

Full text
Abstract:
Abstract With the globalization of markets and increasing competition in global markets, the attempts of organizations to survive in this market has increased and has resulted in the emergence of the philosophy of Supply Chain Management. There is uncertainty in the reliability of supply chain facilities for reasons such as natural disasters, terrorist attacks, labor errors, and weather conditions. Therefore, when making strategic decisions, the system will continue to operate with minimal damage. Over the course of this study, the uncertainty of supplier layers in the supply chain has been modeled. To meet that aim, the issue of supply chain, including producers, warehouses, suppliers and consumers are considered. To calculate the cost of breakdowns due to the non-functioning of distributors, the scenario-building method has been utilized. Finally, the desired model is solved with Gomez software and the results are presented. The result of the study demonstrate the efficiency of this model in the facility location decision-making in supply chains.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (April 1, 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.

Full text
Abstract:
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a peer-to-peer cryptocurrency system enabling an individual user to trade freely without the involvement of banks or any other types of intermediate agents. However, a node in the Bitcoin is vulnerable to the Eclipse attack, which aims to monopolize the information flow of the victim node. A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process. The SMP model is then evaluated to determine the steady-state dependability of the Bitcoin node. Numerical examples are provided to demonstrate the influence of the time to restart the Bitcoin software and time to detect and delete the malicious message on the Bitcoin node dependability.
APA, Harvard, Vancouver, ISO, and other styles
7

Turjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.

Full text
Abstract:
The manufacture of raw materials to deliver the product to the consumer in a traditional supply chain system is a manual process with insufficient data and transaction security. It also takes a significant amount of time, making the entire procedure lengthy. Overall, the undivided process is ineffective and untrustworthy for consumers. If blockchain and smart contract technologies are integrated into traditional supply chain management systems, data security, authenticity, time management, and transaction processes will all be significantly improved. Blockchain is a revolutionary, decentralized technology that protects data from unauthorized access. The entire supply chain management (SCM) will be satisfied with the consumer once smart contracts are implemented. The plan becomes more trustworthy when the mediator is contracted, which is doable in these ways. The tags employed in the conventional SCM process are costly and have limited possibilities. As a result, it is difficult to maintain product secrecy and accountability in the SCM scheme. It is also a common target for wireless attacks (reply attacks, eavesdropping, etc.). In SCM, the phrase “product confidentiality” is very significant. It means that only those who have been validated have access to the information. This paper emphasizes reducing the involvement of third parties in the supply chain system and improving data security. Traditional supply chain management systems have a number of significant flaws. Lack of traceability, difficulty maintaining product safety and quality, failure to monitor and control inventory in warehouses and shops, rising supply chain expenses, and so on, are some of them. The focus of this paper is on minimizing third-party participation in the supply chain system and enhancing data security. This improves accessibility, efficiency, and timeliness throughout the whole process. The primary advantage is that individuals will feel safer throughout the payment process. However, in this study, a peer-to-peer encrypted system was utilized in conjunction with a smart contract. Additionally, there are a few other features. Because this document makes use of an immutable ledger, the hacker will be unable to get access to it. Even if they get access to the system, they will be unable to modify any data. If the goods are defective, the transaction will be halted, and the customer will be reimbursed, with the seller receiving the merchandise. By using cryptographic methods, transaction security will be a feasible alternative for recasting these issues. Finally, this paper will demonstrate how to maintain the method with the maximum level of safety, transparency, and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Chris, and Maria Evangelopoulou. "Defending Against Firmware Cyber Attacks on Safety-Critical Systems." Journal of System Safety 54, no. 1 (April 1, 2018): 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.

Full text
Abstract:
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to “rip and replace” obsolete components. However, the ability to make firmware updates has provided significant benefits to companies who use Programmable Logic Controllers (PLCs), switches, gateways and bridges, as well as an array of smart sensor/actuators. While these updates — which include security patches when vulnerabilities are identified in existing devices — can be distributed by physical media, they are increasingly downloaded over Internet connections. These mechanisms pose a growing threat to the cyber security of safety-critical applications, which is illustrated by recent attacks on safety-related infrastructures across the Ukraine. This paper explains how malware can be distributed within firmware updates. Even when attackers cannot reverse engineer the code necessary to disguise their attack, they can undermine a device by forcing it into a constant upload cycle in which the firmware installation never terminates. In this paper, we present means of mitigating the risks of firmware attacks on safety-critical systems as part of wider initiatives to secure national critical infrastructures. Technical solutions, including firmware hashing, must be augmented by organizational measures to secure the supply chain within individual plants, across companies and throughout safety-related industries.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.

Full text
Abstract:
Logic locking is a hardware security technique aimed at protecting intellectual property against security threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional locking circuitry within an integrated circuit (IC) that induces incorrect digital functionality when an incorrect verification key is provided by a user. The amount of error induced by an incorrect key is known as the effectiveness of the locking technique. A family of attacks known as “SAT attacks” provide a strong mathematical formulation to find the correct key of locked circuits. To achieve high SAT resilience (i.e., complexity of SAT attacks), many conventional logic locking schemes fail to inject sufficient error into the circuit when the key is incorrect. For example, in the case of SARLock and Anti-SAT, there are usually very few (or only one) input minterms that cause any error at the circuit output. The state-of-the-art s tripped functionality logic locking (SFLL) technique provides a wide spectrum of configurations that introduced a tradeoff between SAT resilience and effectiveness. In this work, we prove that such a tradeoff is universal among all logic locking techniques. To attain high effectiveness of locking without compromising SAT resilience, we propose a novel logic locking scheme, called Strong Anti-SAT (SAS). In addition to SAT attacks, removal-based attacks are another popular kind of attack formulation against logic locking where the attacker tries to identify and remove the locking structure. Based on SAS, we also propose Robust SAS (RSAS) that is resilient to removal attacks and maintains the same SAT resilience and effectiveness as SAS. SAS and RSAS have the following significant improvements over existing techniques. (1) We prove that the SAT resilience of SAS and RSAS against SAT attack is not compromised by increase in effectiveness . (2) In contrast to prior work that focused solely on the circuit-level locking impact, we integrate SAS-locked modules into an 80386 processor and show that SAS has a high application-level impact. (3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and their effectiveness is similar to SFLL.
APA, Harvard, Vancouver, ISO, and other styles
10

Shinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.

Full text
Abstract:
Storing& processing data for supply chain management (SCM) systems requires design of high-security and quality of service (QoS) aware models. These modelsassist in improving traceability performance of SCM deployments via integration of transparent & distributed mechanisms. A wide variety of security models are proposed by researchers to perform these tasks, and it is observed that blockchain-based SCM implementations outperform other models in terms of security & QoS metrics.But most of these implementationsare general-purpose and do not incorporate SCM-specific consensus & mining rules. It is also observed that, mining speed& throughput performance of these blockchain-based implementations reduces exponentially w.r.t. number of SCM transactions. To resolve these issues, this paper discusses design of a novel Proof-of-Supply Chain (PoSC) based consensus model, which is specifically designed for sidechain based SCM deployments. The PoSC consensus model is used for high-efficiency SCM-based data storage and communication scenarios. The proposed PoSC consensus model is capable of resisting selfish mining, time jacking, and sybil attacks, which are targeted towards SCM deployments. The model uses temporal performance metrics of miner nodes, and combines them with relationship graphs to form an SCM miner rank. Based on this rank, miner nodes are selected, and their consensus responses are recorded. These responses are processed using an augmented deep learning model, that is trained over 8 different SCM implementations via machine learning. After successful mining, responses obtained from these miners are used to incrementally train the machine learning model which assists in continuous performance improvement. The SCMBQA model was tested on milk supply chain, agriculture supply chain, and electronic supply chain applications, in terms of computational speed, throughput, energy requirement, retrieval & verification delay, and storage requirements. It was observed that the proposed PoSC consensus was capable of improving the computational speed by 8.5%, reduce energy consumption by 4.9%, improve throughput by 9.6%, and reduce storage costs by 15.4% when compared with standard blockchain-based SCM consensus models. This is because the proposed model deploys an intelligent sidechaining approach, that is capable of optimizing number of generated sidechains via temporal QoS & security performance metrics. Due to use of smaller chain lengths, the proposed model is capable of integrating privacy-aware & secure approaches depending upon different SCM stages. Thus, distributor-level security models are different than retailer-level security models, which assists in context-sensitive block deployments. Due to use of PoSC, the proposed model was observed to be 99.5% resilient against internal and external attacks, which makes it useful for real-time SCM deployments.
APA, Harvard, Vancouver, ISO, and other styles
11

Kajtez, Nemanja, Yue Zhang, and Basel Halak. "Lockit: A Logic Locking Automation Software." Electronics 10, no. 22 (November 17, 2021): 2817. http://dx.doi.org/10.3390/electronics10222817.

Full text
Abstract:
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. The multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat these, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches has been rather slow due to the lack of integration with the IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist, which can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile when trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions.
APA, Harvard, Vancouver, ISO, and other styles
12

Paul, Shubhra Deb, and Swarup Bhunia. "SILVerIn: Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–28. http://dx.doi.org/10.1145/3460232.

Full text
Abstract:
A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in-field tampering of PCBs have become significant security concerns in the semiconductor industry as a result of increasing untrusted entities in the supply chain. These counterfeit components may result in performance degradation, profit reduction, and reputation risk for the manufacturers. While Integrated Circuit (IC) level authentication using physical unclonable functions (PUFs) has been widely investigated, countermeasures at the PCB level are scarce. These approaches either suffer from significant overhead issues, or opportunistic counterfeiters can breach them like clockwork. Besides, they cannot be extended to system-level (both chip and PCB together), and their applications are also limited to a specific purpose (i.e., either counterfeiting or tampering). In this article, we introduce SILVerIn , a novel systematic approach to verify the authenticity of all chips used in a PCB as well as the board for combating attacks such as counterfeiting, cloning, and in-field malicious modifications. We develop this approach by utilizing the existing boundary scan architecture (BSA) of modern ICs and PCBs. As a result, its implementation comes at a negligible (∼0.5%) hardware overhead. SILVerIn is integrated into a PCB design during the manufacturing phase. We implement our technique on a custom hardware platform consisting of an FPGA and a microcontroller. We incorporate the industry-standard JTAG (Joint Test Action Group) interface to transmit test data into the BSA and perform hands-on measurement of supply current at both chip and PCB levels on 20 boards. We reconstruct these current values to digital signatures that exhibit high uniqueness, robustness, and randomness features. Our approach manifests strong reproducibility of signatures at different supply voltage levels, even with a low-resolution measurement setup. SILVerIn also demonstrates a high resilience against machine learning-based modeling attacks, with an average prediction accuracy of ∼51%. Finally, we conduct intentional alteration experiments by replacing the on-board FPGA to replicate the scenario of PCB tampering, and the results indicate successful detection of in-field modifications in a PCB.
APA, Harvard, Vancouver, ISO, and other styles
13

Seth, Dinesh, Nitin Seth, and Deepak Goel. "Application of value stream mapping (VSM) for minimization of wastes in the processing side of supply chain of cottonseed oil industry in Indian context." Journal of Manufacturing Technology Management 19, no. 4 (May 2, 2008): 529–50. http://dx.doi.org/10.1108/17410380810869950.

Full text
Abstract:
PurposeThe purpose of this paper is to identify and address various wastes in the supply chain of the edible cottonseed oil industry (specifically the processing side) using a value stream mapping (VSM) approach to improve productivity and capacity utilization in an Indian context.Design/methodology/approachCritical observations and interviewing techniques were used with open‐ended questions to understand the processes involved in the value chain of the cottonseed oil industry. Different chain links/members were investigated through personal visits and discussions. VSM is applied as an approach to the industry to identify and remove non‐value‐adding (NVA) activities.FindingsMajor findings obtained from the study are as follows. There is an excess cumulative inventory of 244 days in the whole supply chain. The industry is highly fragmented with a large number of small players present, which hampers the use of economies of scale. There are NVA activities present in the supply chain such as the moving of cottonseed oil from expeller mill to refinery. The industry still uses outdated technology which hampers the productivity.Practical implicationsAttention needs to be given to boosting the productivity of the oil sector. Waste removal from the oilseed‐processing sector is one key to improving the productivity of the sector.Originality/valueThe paper addresses the various wastes in the processing side of the supply chain of the Indian cottonseed oil industry, using VSM as an approach which was hardly ever attempted before. Wastes are then individually attacked to reduce or eliminate them from the system. Suggestions to make the whole chain more productive can be generalized and can be replicated in the context of other developing countries.
APA, Harvard, Vancouver, ISO, and other styles
14

Zhao, Guangwei, and Kaveh Shamsi. "Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation." Cryptography 6, no. 4 (November 22, 2022): 60. http://dx.doi.org/10.3390/cryptography6040060.

Full text
Abstract:
Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced. Although the SAT attack is effective in deobfuscating a wide range of logic locking schemes, its execution time varies widely from a few seconds to months. Previous research has shown that Graph Convolutional Networks (GCN) may be used to estimate this deobfuscation time for locked circuits with varied key sizes. In this paper, we explore whether GCN models truly understand/capture the structural/functional sources of deobfuscation hardness. In order to tackle this, we generate different curated training datasets: traditional ISCAS benchmark circuits locked with varying key sizes, as well as an important novel class of synthetic benchmarks: Substitution-Permutation Networks (SPN), which are circuit structures used to produce the most secure and efficient keyed-functions used today: block-ciphers. We then test whether a GCN trained on a traditional benchmark can predict the simple fact that a deeper SPN is superior to a wide SPN of the same size. We find that surprisingly the GCN model fails at this. We propose to overcome this limitation by proposing a set of circuit features motivated by block-cipher design principles. These features can be used as stand-alone or combined with GCN models to provide deeper topological cues than what GCNs can access.
APA, Harvard, Vancouver, ISO, and other styles
15

Deyannis, Dimitris, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos, and Sotiris Ioannidis. "The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains." Electronics 11, no. 13 (June 22, 2022): 1944. http://dx.doi.org/10.3390/electronics11131944.

Full text
Abstract:
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity on SCs are constantly researched into and proposed. Hence, this work presents the implementation of a low-cost reconfigurable intrusion detection system (IDS), on the edge, that can be easily integrated into SC networks, thereby elevating the featured levels of security. Specifically, the proposed system offers real-time cybersecurity intrusion detection over high-speed networks and services by offloading elements of the security check workloads on dedicated reconfigurable hardware. Our solution uses a novel framework that implements the Aho–Corasick algorithm on the reconfigurable fabric of a multi-processor system-on-chip (MPSoC), which supports parallel matching for multiple network packet patterns. The initial performance evaluation of this proof-of-concept shows that it holds the potential to outperform existing software-based solutions while unburdening SC nodes from demanding cybersecurity check workloads. The proposed system performance and its efficiency were evaluated using a real-life environment in the context of European Union’s Horizon 2020 research and innovation program, i.e., CYRENE.
APA, Harvard, Vancouver, ISO, and other styles
16

Duan, Wei, Xuelin Li, Desheng Xu, Hui Ma, Fu Sai, and Xi Lian. "ECONOMIC PSYCHOLOGY ANALYSIS OF RECYCLERS' EMOTIONAL STABILITY IN CLOSED-LOOP SUPPLY CHAIN UNDER UNCERTAINTY." International Journal of Neuropsychopharmacology 25, Supplement_1 (July 1, 2022): A55—A56. http://dx.doi.org/10.1093/ijnp/pyac032.077.

Full text
Abstract:
Abstract Background In today's society, with the sustainable development of economy, material products are rich and diverse. The production speed of products has far exceeded people's needs. Emission reduction and environmental protection have become people's new pursuit. Closed loop supply chain should consider not only product life cycle and recycling, but also economic and environmental benefits. It has become the focus of scholars all over the world. Closed loop supply chain refers to the complete supply chain cycle from procurement to final sales, including product recovery and reverse logistics supported by life cycle. It is a highly complex process. In the closed-loop supply chain, the simplest form is composed of manufacturers, retailers and recyclers. Recycler is the most critical link in the new closed-loop supply chain system, which is not available in the traditional supply chain. Therefore, this paper mainly studies the change of recyclers when exogenous variables fluctuate from the perspective of economic psychology. Research Objects and Methods Most scholars use short-term static methods when studying the uncertainty of recyclers in closed-loop supply chain. It is particularly important to analyze the uncertain factors in the closed-loop supply chain. In order to analyze this problem, this paper first improves the closed-loop supply chain model of capital flow and logistics coupling, so as to better simulate the real closed-loop supply chain. Secondly, the sensitivity analysis function of Vensim software is used to simulate the impact of exogenous variables on the inventory value and capital value of recyclers in the closed-loop supply chain model. At the same time, in order to verify the impact of recyclers' emotional stability, this study adopts the following scale. The communication anxiety scale adopts 15 questions of the Interaction Anxiety Scale (IAS) compiled by Leary, with a single dimension and a 5-level score, from 1 to 5 to “very inconsistent”. The higher the score, the greater the degree of social anxiety. The emotion regulation self-efficacy scale adopts the emotion regulation self-efficacy scale (RES) revised by Caprara. The 12 questions are divided into three dimensions: expressing positive emotions, managing depression / pain and self-efficacy of managing anger / anger, with 4 questions in each dimension. A 5-level score is adopted, from 1 to 5, which means “very inconsistent” to “very consistent”. The higher the score, the higher the degree of self-confidence in regulating their emotions. In the study, Cronbach's α The coefficient is 0.80. The aggression scale adopts the aggression scale (bpaq) compiled by Buss and Perry The scale has 29 questions and is divided into four dimensions: physical aggression, verbal aggression, anger and hostility. The higher the score, the stronger the attack. In this study, Cronbach's α The coefficient is 0.85. The depression questionnaire adopts Beck's revised depression Inventory-II (BDI-II). The questionnaire has 21 questions, with a single dimension. The higher the total score, the heavier the degree of depression. The data were obtained by spss19 0 and amos17 0 for analysis. Results the 19 exogenous variables were divided into four categories: Manufacturer related parameters, retailer related parameters, recycler related parameters and other related parameters. The sensitivity of these 19 parameters to recycler inventory and capital in closed-loop supply chain is simulated and analyzed. Through the comparative analysis of sensitivity chart, it can be seen that the manufacturer's inventory adjustment time, the retailer's safety inventory coefficient, the retailer's smoothing time, the retailer's inventory adjustment time, the collector's fixed expenditure and the collector's initial inventory value are positively correlated. And have a significant impact on collectors' inventory and emotional stability. The reason is that appropriate time adjustment helps to reduce work pressure and naturally improve job satisfaction. Conclusion in the closed-loop supply chain, the fluctuation of the same exogenous variable in the same range has a more significant impact on the recycler's inventory than on the recycler's capital. For recyclers, the decline of inventory value has a positive impact on the capital of recyclers, while the decline of capital value has a negative impact on the capital of recyclers. The impact of retailer order smoothing time on recycler inventory and capital is uncertain. Therefore, recyclers should strengthen fund management, establish insurance mechanism and prepare reserves to prevent the impact of external variable fluctuations on recyclers' funds. At the same time, in view of the uncertainty caused by exogenous variables related to manufacturers and retailers on recyclers' funds and inventory, recyclers need to deal with it through information sharing, compensation mechanism, incentive and other ways. Acknowledgements Supported by a project grant from National Natural Science Foundation of China (Grant No.71764019), the National Social Science Foundation of China (Grant No.19BGL187), the Planning Project of Philosophy and Social Science of Inner Mongolia (Grant No.2021NDB082), Inner Mongolia Natural Science Foundation (Grant No.2021MS07016 and 2020MS07020) and Research Center for Resources, Environment and Energy Development Strategic.
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Yang, Yang Zhang, Yongsheng Yang, and Yan Ma. "DOCS: A Data Ownership Confirmation Scheme for Distributed Data Trading." Systems 10, no. 6 (November 19, 2022): 226. http://dx.doi.org/10.3390/systems10060226.

Full text
Abstract:
Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data, and accountability. In this paper, we propose a new data ownership confirmation scheme (DOCS) in the transaction scenario of blockchain-empowered distributed data assets trading. It integrates smart contracts, data-embedding technology, and data fingerprint to realize ownership confirmation and protection of data assets in transactions. DOCS ensures reliable mapping between on-chain data ownership information and off-chain data entities, which assists with the accurate prosecution of the illegal distribution of data assets. We demonstrate that DOCS can have desirable security properties in multiple attack models.
APA, Harvard, Vancouver, ISO, and other styles
18

Kannan, R. Rajesh, and S. Vasantha. "COVID 19 Outbreaks on the Growth of Self Servicing Technology Using Digital Payments." Webology 18, no. 2 (December 23, 2021): 22–40. http://dx.doi.org/10.14704/web/v18i2/web18305.

Full text
Abstract:
In comparison to any other International crisis, Covid19 was sudden and did not leave much time for individuals or Governments to prepare in terms of the impact it had on healthcare infrastructure or trade-in various sectors. The modern world is highly connected and stopping the inter-country movement of people is very difficult. Given the rapid increase of cases, Covid19 was declared as a pandemic and for lack of any other viable option, most Governments chose the way of locking down the economy. There was little information on how Covid19 spreads mortality rate or recovery rate, etc. Impetus on social distancing forced people to get wary of any contact including the exchange of cash which in turn resulted in the rapid adoption of alternate measures such as digital payments. Supply chain management was badly hit and demand for essential products and services increased significantly. Although overall volumes of digital payments went down due to adverse impact on several sectors, its usage as a replacement of cash increased significantly. This sudden increase and adoption by people who are not technology-savvy gave rise to frauds and cyber-attacks. Thus there arose a need for stringent regulations, the evolution of technology, and enhanced user education. There has been a significant push by the Government for achieving a cashless economy and digital payments surely will provide robust support for this objective. RBI has also proposed a self-regulatory body for digital payment and has taken initiatives like making NEFT available 24*7 and removing applicable charges. There are rising impetus and applications of digital payment technologies in day-to-day and business-related trade transactions.
APA, Harvard, Vancouver, ISO, and other styles
19

Buchicchio, Emanuele, Luca Grilli, Eros Capobianco, Salvatore Cipriano, and Diego Antonini. "Invisible Supply Chain Attacks Based on Trojan Source." Computer 55, no. 10 (October 2022): 18–25. http://dx.doi.org/10.1109/mc.2022.3190801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Yudina, Tamara N., Petr S. Lemeshchenko, and Elena V. Kupchishina. "Features of New Institutions in The Digital Economy." Journal of Institutional Studies 14, no. 3 (September 25, 2022): 031–45. http://dx.doi.org/10.17835/2076-6297.2022.14.3.031-045.

Full text
Abstract:
Digital trust and, simultaneously, global distrust became a topical issue in the context of modern trends in the socioeconomic systems development: informatization, internetization, networkization, digitalization. A. Guterres asserts global distrust as one of the four “horsemen of the apocalypse” that threaten all of humanity at the present time. Vulnerability of Russia's positions in the global information and digital space, represented in the predominance of foreign (primarily Western) software and Chinese hardware, cyber-attacks on strategic infrastructure facilities, leaks and the actual vulnerability of personal data of the population (often almost unhindered access for fraudsters to the personal data of residents and non-residents), actualizes the need to strengthen national information security and, therefore, the perspective of the article. A research of digital trust, coupled with artificial intelligence and cyber, information and digital economic security, is conducted based on the methods of institutional-economic, interdisciplinary, empirical generalization, interpretation of new economic institutions and concepts, hypothesizing and scientific approach to the analysis of a new digital socio-economic reality. The research results are, firstly, a confirmed relationship between digital trust and digital economic security; second, digital trust and artificial intelligence; third, digital distrust and institutional traps in the context of artificial intelligence; fourth, the institutional aspects of AI on the example of China. The authorial hypothesis is formulated as the following: are destructive institutions and institutional-economic thinking formed in the context of the economy and society digitalization, the development of a Russian digital economy model with conflicting institutions? The novelty of the study involves clarifying the definitions of the institution of trust, digital global distrust, as well as digital institutional traps, the level of digital trust (for business, the abovementioned is reflected in building a trust system in supply chains, measured in terms of user confidence in information and digital goods, in the protection of personal data, their confidentiality).
APA, Harvard, Vancouver, ISO, and other styles
21

Levy, E. "Poisoning the software supply chain." IEEE Security & Privacy 1, no. 3 (May 2003): 70–73. http://dx.doi.org/10.1109/msecp.2003.1203227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ball, Michael O., Meng Ma, Louiqa Raschid, and Zhengying Zhao. "Supply chain infrastructures." ACM SIGMOD Record 31, no. 1 (March 2002): 61–66. http://dx.doi.org/10.1145/507338.507350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Farsi, Sana, Halima Bensmail, and Spiridon Bakiras. "Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks." Machines 10, no. 6 (May 31, 2022): 431. http://dx.doi.org/10.3390/machines10060431.

Full text
Abstract:
Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. The primary goal of using a blockchain for supply chain management is to reduce the overall production cost while providing comprehensive security to the system. However, current blockchain-based supply-chain workflow(s) (BSW) are still susceptible to various cyber threats due to evolving business processes of different stakeholders involved in the process. In fact, current BSW protects the supply chain process based on the rules that have been implemented in the corresponding smart contracts. However, in practice, the requirements for the process keep evolving due to several organizational policies and directives of the involved stakeholders; therefore, current blockchain-based solutions fail to protect the supply chain process against attacks that exploit the process-related information that is not protected by smart contracts. Therefore, the goal of this work was to develop a methodology that enhances the protection of BSW against various internal (e.g., Stuxnet) and external (e.g., local data breach of a stakeholder) cyber threats through monitoring the stakeholder business process. Our methodology complements the blockchain-based solution because it protects the stakeholder’s local process against the attacks that exploit the process information that is not protected in the smart contracts. We implemented a prototype and demonstrated its application to a typical supply chain workflow example application by successfully detecting internal and external attacks to the application.
APA, Harvard, Vancouver, ISO, and other styles
24

Mukhsin, Moh, HER Taufik, Asep Ridwan, and Tulus Suryanto. "The mediation role of supply chain agility on supply chain orientation-supply chain performance link." Uncertain Supply Chain Management 10, no. 1 (2022): 197–204. http://dx.doi.org/10.5267/j.uscm.2021.9.008.

Full text
Abstract:
This study aims to analyze the supply chain performance mediation on the relationship between supplier flexibility, supply agility, and company performance. The population in this study were 100 broilers in the districts / cities in Banten Province. The data to be used in this study are primary data, through sending questionnaires. Development of theoretical models with five hypotheses processed in the analysis using SmartPLS Software version 3.0.m3. The results showed that supplier flexibility and supply agility have a positive and significant effect on company performance, supplier flexibility and supply agility have a positive and significant effect on supply chain performance and supply chain performance has a positive and significant effect as an intervening variable to the company performance. Supply chain mediation has an important role in integrating production processes from upstream to downstream, including establishing good relations between businesses involved in supply chain management to improve the company's performance.
APA, Harvard, Vancouver, ISO, and other styles
25

Warren, Matthew, and William Hutchinson. "Cyber attacks against supply chain management systems: a short note." International Journal of Physical Distribution & Logistics Management 30, no. 7/8 (September 2000): 710–16. http://dx.doi.org/10.1108/09600030010346521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Ge, Shouqian Shi, Minmei Wang, Chen Qian, Cong Zhao, Han Ding, Wei Xi, and Jizhong Zhao. "RF-Chain." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (December 21, 2022): 1–28. http://dx.doi.org/10.1145/3569493.

Full text
Abstract:
Blockchain-based supply chains provide a new solution to decentralized multi-party product management. However, existing methods, including ID-based and cryptographic-based solutions, cannot achieve both counterfeit resistance and decentralization in supply chain management. We argue that this dilemma comes from the disconnection and inconsistency of the data records and physical product entities. This paper proposes RF-Chain, a novel decentralized supply chain management solution that uniquely combines data record authentication and physical-layer RFID tag authentication to effectively achieve credibility and counterfeit resistance. The main contribution of this work is to integrate physical-layer authentication of cheap commodity RFID tags into a blockchain-based information management system, and RF-Chain is the first to do so. The proposed cross-layer authentication can effectively defend against counterfeit attacks without relying on a central key management service. Real-world experiments utilizing the Ethereum (ETH) platform and more than 100 RFID tags demonstrate that RF-Chain is secure, effective, time-efficient, and cost-efficient.
APA, Harvard, Vancouver, ISO, and other styles
27

Kshetri, Nir, and Jeffrey Voas. "Supply Chain Trust." IT Professional 21, no. 2 (March 1, 2019): 6–10. http://dx.doi.org/10.1109/mitp.2019.2895423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Karmanov, V. S., B. S. Solov’ev, and V. Yu Shсhekoldin. "SOFTWARE DEVELOPMENT FOR SUPPLY CHAIN INTERACTION MODELING." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 186 (December 2019): 18–26. http://dx.doi.org/10.14489/vkit.2019.12.pp.018-026.

Full text
Abstract:
The study of complex logistic systems often requires specialized software that allows studying the characteristics and properties of the observed object using simulation methods. An example of such a system is the supply network, in the general case of an arbitrary structure. For linear supply chains known business game “Beer Game”, which allows to observe and explore the effects that occur in long supply chains. The aim of the work was to develop a model that is a generalization of the original “Beer Game” in the case of a supply network of arbitrary topology and the development of software that allows investigating the resulting model using simulation methods. In this paper the mathematical model of the supply chain is presented. A set of algorithms for estimating and forming the order volume by each network participant is proposed. The developed application that emulates the work of the supply chain is described. Various ways of creating a supply network topology have been proposed, and a description of the parameters for modeling the supply network has been given. The capabilities of the application are demonstrated when generating data and interpreting the obtained results in the form of tables, graphs, and animation. The ways of forming supply chains with different characteristics are studied. Experiments on the study of algorithms for estimating the volume of orders on various topologies of supply chains were carried out. Ways to assess the performance of the supply chain were proposed. The developed software can be used to justify the choice of strategy for managing supply chains in distribution logistics for industrial and commercial enterprises of various sizes, from large networks to retail. In addition, the developed software can be used in the educational process for students of economic specialties.
APA, Harvard, Vancouver, ISO, and other styles
29

Wirth, Axel. "Cyberinsights: Talking about the Software Supply Chain." Biomedical Instrumentation & Technology 54, no. 5 (September 1, 2020): 364–67. http://dx.doi.org/10.2345/0899-8205-54.5.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Verwijmeren, Martin. "Software component architecture in supply chain management." Computers in Industry 53, no. 2 (February 2004): 165–78. http://dx.doi.org/10.1016/j.compind.2003.07.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Fajar, Ahmad Nurul, Ditdit Nugeraha Utama, and Gunawan Wang. "Intelligent Software Product Line For Supply Chain." Journal of Physics: Conference Series 1090 (September 2018): 012043. http://dx.doi.org/10.1088/1742-6596/1090/1/012043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Favilla, Jose, and Andrew Fearne. "Supply chain software implementations: getting it right." Supply Chain Management: An International Journal 10, no. 4 (September 1, 2005): 241–43. http://dx.doi.org/10.1108/13598540510612695.

Full text
Abstract:
PurposeTo highlight key success factors in supply chain projects.Design/methodology/approachThe paper presents insights from a number of supply chain projects in which IT has played an important part in the business solution.FindingsSuccessful supply chain projects have four things in common: the right leadership, the right focus, the right approach and effective communication of KPIs to all stakeholders engaged in the project.Research limitations/implicationsThe focus of the paper is on supply chain projects with a significant IT component, but the key success factors identified are common to the majority of supply chain projects.Practical implicationsCompanies must not assume that investment in IT is, by itself, a solution to their supply chain solutions. A lack of leadership, focus and communication will invariably result in sub‐optimal outcomes which are all too frequently attributed to the complex nature of the project or the inflexibility of the software when in most cases the problems are internal to the businesses involved and the project management process.Originality/valueThis paper provides practical tips for improving the likelihood of getting the most out of IT‐based supply chain projects.
APA, Harvard, Vancouver, ISO, and other styles
33

Aslam, Haris, Abdul Qadeer Khan, Kamran Rashid, and Saif-ur Rehman. "Achieving supply chain resilience: the role of supply chain ambidexterity and supply chain agility." Journal of Manufacturing Technology Management 31, no. 6 (April 24, 2020): 1185–204. http://dx.doi.org/10.1108/jmtm-07-2019-0263.

Full text
Abstract:
PurposeThis study analyzes the role of supply chain ambidexterity (SC-Ambidexterity) in developing supply chain resilience (SC-Resilience). We describe SC-Ambidexterity as a simultaneous application of supply chain adaptability (SC-Adaptability) and supply chain alignment (SC-Alignment) capabilities. We also consider the role of supply chain agility (SC-Agility) in the relationship between SC-Ambidexterity and SC-Resilience. We further suggest that the relationship between SC-Ambidexterity and SC-Resilience may be stronger in case of higher market uncertainty.Design/methodology/approachBased on the dynamic capabilities view (DCV) of the firm, we develop a set of hypotheses that are tested through a survey of manufacturing firms in Pakistan. The hypothesized model is tested through structural equation modeling (SEM).FindingsThe results of this study show a positive effect of SC-Ambidexterity on SC-Resilience. SC-Agility positively mediates the relationship between SC-Ambidexterity and SC-Resilience. However, our results show that this relationship does not vary at different levels of environmental uncertainty.Originality/valueThis study provides the seminal operationalization of SC-Ambidexterity in the supply chain context. It further shows the importance of SC-Ambidexterity and SC-Agility in contributing toward SC-Resilience.
APA, Harvard, Vancouver, ISO, and other styles
34

Yeboah-Ofori, Abel, and Shareeful Islam. "Cyber Security Threat Modeling for Supply Chain Organizational Environments." Future Internet 11, no. 3 (March 5, 2019): 63. http://dx.doi.org/10.3390/fi11030063.

Full text
Abstract:
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.
APA, Harvard, Vancouver, ISO, and other styles
35

EL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.

Full text
Abstract:
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain. In recent years, multiple cyber-attacks have targeted medical supply chain communication networks due to their lack of security measures. In the era where cyber-attacks are cheaper and easier due to the computational power and various algorithms available for malicious uses, security, and data privacy requires intensive and higher measures. On the other hand, Information Hiding Techniques (IHT) compromise various advanced methods to hide sensitive information from being disclosed to malicious nodes. Moreover, with the support of Blockchain, IHT can bring higher security and the required privacy levels. In this paper, we propose the implementation of Blockchain and smart contract with the information hiding technique to enhance the security and privacy of data communication in critical systems, such as smart healthcare supply chain communication networks. Results show the feasibility of the framework using Hyperledger smart contract along with the desired security level.
APA, Harvard, Vancouver, ISO, and other styles
36

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 1 (January 2001): 48. http://dx.doi.org/10.1177/003754970107600107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 2 (February 2001): 121. http://dx.doi.org/10.1177/003754970107600216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 3 (March 2001): 186. http://dx.doi.org/10.1177/003754970107600308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 4 (April 2001): 241. http://dx.doi.org/10.1177/003754970107600410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 76, no. 5 (May 2001): 307. http://dx.doi.org/10.1177/003754970107600518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bruzzone, Agostino G. "Supply Chain Simulation." SIMULATION 77, no. 3-4 (September 2001): 155. http://dx.doi.org/10.1177/003754970107700309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Davidson, Rebecca K., Wilson Antunes, Elisabeth H. Madslien, José Belenguer, Marco Gerevini, Tomas Torroba Perez, and Raffaello Prugger. "From food defence to food supply chain integrity." British Food Journal 119, no. 1 (January 3, 2017): 52–66. http://dx.doi.org/10.1108/bfj-04-2016-0138.

Full text
Abstract:
Purpose Consumer confidence in the European food industry has been shaken by a number of recent scandals due to food fraud and accidental contamination, reminding the authors that deliberate incidents can occur. Food defence methods aim to prevent or mitigate deliberate attacks on the food supply chain but are not a legal requirement. The purpose of this paper is to discuss how proactive and reactive food defence practices can help prevent or mitigate malicious attacks on the food chain and also food fraud, food crime and food safety. The authors look at how food defence differs from food safety and how it contributes to food supply chain integrity. Design/methodology/approach Food defence has been the focus of two different EU FP7 security projects, EDEN and SNIFFER. Food industry stakeholders participated in workshops and demonstrations on food defence and relevant technology was tested in different food production scenarios. Findings Food industry end-users reported a lack of knowledge regarding food defence practices. They wished for further guidelines and training on risk assessment as well as access to validated test methods. Novel detection tools and methods showed promise with authentication, identification, measurement, assessment and control at multiple levels of the food supply chain prior to distribution and retail. Practical implications The prevention of a contamination incident, prior to retail, costs less than dealing with a large foodborne disease outbreak. Food defence should therefore be integral to food supply chain integrity and not just an afterthought in the wake of an incident. Originality/value It is argued that food defence practices have a vital role to play across the board in unintentional and intentional food contamination incidents. The application of these methods can help ensure food supply chain integrity.
APA, Harvard, Vancouver, ISO, and other styles
43

Gorane, S. J., and Ravi Kant. "Supply chain practices." Benchmarking: An International Journal 23, no. 5 (July 4, 2016): 1076–110. http://dx.doi.org/10.1108/bij-06-2014-0059.

Full text
Abstract:
Purpose – The purpose of this paper is to investigate the current level of supply chain practices (SCPs) in Indian manufacturing organizations. Design/methodology/approach – The 15 SCPs are identified based on the literature support and opinion of industry experts and academia, and data were collected from 292 organizations. Data were analyzed using the statistical package for the social science software to see the current level/penetration of SCPs in Indian manufacturing organizations. Findings – The practices, namely, organizational culture, customer relationship, information and communication technology, benchmarking and performance measurement, lean manufacturing, agile manufacturing, supplier relationship are highly penetrated practices in Indian manufacturing organizations. The practices, namely, outsourcing, information sharing, just in time manufacturing, green supply chain management are moderately penetrated practices, while the practices, namely, reverse logistics, postponement, vendor managed inventory, radio frequency are least penetrated practices in Indian manufacturing organizations. Research limitations/implications – Further study can be extended to see the of penetration practices applicable to service and agriculture sectors. Practical implications – The result of this paper will enable the organizations to identify and direct their focus on the areas that requires improvement. Also, the organizations will become more aware of the SCPs that will help in boosting up their performance and competitiveness and indirectly boost the growth and contribute to India’s economic development. Originality/value – This is the first kind of study which checked the level of selected SCPs in Indian manufacturing organizations.
APA, Harvard, Vancouver, ISO, and other styles
44

McGregor, John D. "The Weak Link in the Supply Chain." Journal of Object Technology 3, no. 8 (2004): 71. http://dx.doi.org/10.5381/jot.2004.3.8.c7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Prestifilippo, Giovanni. "Resilienz für die Supply Chain." Logistik für Unternehmen 35, no. 09-10 (2021): 39–41. http://dx.doi.org/10.37544/0930-7834-2021-09-10-39.

Full text
Abstract:
Software-Systeme für intelligentes Supply Chain Network Design bieten optimale Risikovorsorge für die Stabilität der Supply Chain. Bereits im Vorfeld lassen sich mit ihnen für eine Vielzahl potenzieller Risiken funktionierende Alternativen zu den etablierten Distributions- und Versorgungsketten planen und vorhalten, um Reaktionszeiten und Einbußen zu minimieren.
APA, Harvard, Vancouver, ISO, and other styles
46

Cao, Cheng Xuan, Chong Ling Ren, Wen Wen Shi, and Jing Li. "A Study on Supply Chain Management of Software-Focused Products." Applied Mechanics and Materials 66-68 (July 2011): 995–1000. http://dx.doi.org/10.4028/www.scientific.net/amm.66-68.995.

Full text
Abstract:
In this paper, we introduce the concept of the software-focused chain. A software focused product consists of hardware component and software component, where the software component is either the higher value part of the product. We study a software-focused product and service supply chain based on the case study of Beijing UniStrong Company. We discuss the common and unique issues that a software-focused supply chain has compared with a traditional supply chain. Issues and challenges of the software-focused supply chain management have also been studied in the paper.
APA, Harvard, Vancouver, ISO, and other styles
47

Tarigan, Zeplin Jiwa Husada, Hotlan Siagian, and Ferry Jie. "Impact of Internal Integration, Supply Chain Partnership, Supply Chain Agility, and Supply Chain Resilience on Sustainable Advantage." Sustainability 13, no. 10 (May 13, 2021): 5460. http://dx.doi.org/10.3390/su13105460.

Full text
Abstract:
The global order has suddenly changed due to the COVID-19 pandemic. Many countries, including Indonesia, have applied lockdown policies to stop the spread of COVID-19. Lockdown policies have disrupted the supply of raw materials and the demand for finished goods. The manufacturing industry is one of the sectors that has suffered most in this situation, and they have struggled to reconfigure their internal and external supply chain network and partnership. This study examined the impact of internal integration, supply chain partnership, supply chain agility, and supply chain resilience on sustainable advantage. The participants of this study were from manufacturing companies in Indonesia. For data collection, a questionnaire was used, with a five-point Likert scale to obtain the respondents’ opinions. Using Google Form link, the questionnaire was distributed via email and the WhatsApp social media application to the predetermined set of manufacturing companies. Respondents filled out 672 questionnaires, and 456 respondents (corresponding to 67.86%) filled it out correctly and were considered valid for further analysis. Partial least squares (PLS) regression was used to analyze the data using the SmartPLS software version 3.3. The results supported all nine hypotheses proposed. Internal integration through interdepartmental data sharing affects supply chain (SC) partnerships, SC agility, and SC resilience. Moreover, SC partnerships, through the on-time delivery of materials and by coping with changing demand, improve SC agility, SC resilience, and sustainable advantages. SC agility, in keeping the production process running normally and regulating the production capacity, affects SC resilience and sustainable advantage. SC resilience improves sustainable advantage by providing timely product delivery and reliable sales volumes in pandemic conditions. These results provide insights for managers into enhancing the sustainable advantage by improving supply chain agility, supply chain resilience, and supply chain partnerships. This study could contribute and extend the acceptance of previous studies in the context of the manufacturing industry.
APA, Harvard, Vancouver, ISO, and other styles
48

Soto-Valero, Cesar, Martin Monperrus, and Benoit Baudry. "The Multibillion Dollar Software Supply Chain of Ethereum." Computer 55, no. 10 (October 2022): 26–34. http://dx.doi.org/10.1109/mc.2022.3175542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sebastian, Kot, and Ślusarczyk Beata. ""Process Simulation In Supply Chain Using Logware Software "." Annales Universitatis Apulensis Series Oeconomica 2, no. 11 (December 31, 2009): 932–37. http://dx.doi.org/10.29302/oeconomica.2009.11.2.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tucci, Christopher L., Allen Kaufman, Craig H. Wood, and Gregory Theyel. "Collaboration and Teaming in the Software Supply Chain." Supply Chain Forum: An International Journal 6, no. 2 (January 2005): 16–28. http://dx.doi.org/10.1080/16258312.2005.11517144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography