Literatura académica sobre el tema "Software Supply Chain Attacks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Software Supply Chain Attacks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Software Supply Chain Attacks"
Martínez, Jeferson y Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study". International Journal of Safety and Security Engineering 11, n.º 5 (31 de octubre de 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Texto completoКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин y Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS". ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, n.º 1(-) (5 de abril de 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Texto completoWatney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective". European Conference on Cyber Warfare and Security 21, n.º 1 (8 de junio de 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Texto completoKaczorowski, Maya, Falcon Momot, George V. Neville-Neil y Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, n.º 5 (31 de octubre de 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Texto completoChetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed y Mustafa M. Kadhim. "Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors". Foundations of Computing and Decision Sciences 47, n.º 4 (1 de diciembre de 2022): 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.
Texto completoZhou, Chencheng, Liudong Xing, Qisi Liu y Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation". International Journal of Mathematical, Engineering and Management Sciences 6, n.º 2 (1 de abril de 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.
Texto completoTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur y Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract". Scientific Programming 2021 (28 de septiembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Texto completoJohnson, Chris y Maria Evangelopoulou. "Defending Against Firmware Cyber Attacks on Safety-Critical Systems". Journal of System Safety 54, n.º 1 (1 de abril de 2018): 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.
Texto completoLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty y Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact". ACM Journal on Emerging Technologies in Computing Systems 17, n.º 3 (11 de mayo de 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Texto completoShinkar, Sonali V. y Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios". International Journal on Recent and Innovation Trends in Computing and Communication 10, n.º 1s (10 de diciembre de 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Texto completoTesis sobre el tema "Software Supply Chain Attacks"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain". Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Texto completoRueda, Guerrero María Ximena. "Robustness of complex supply chain networks to targeted attacks". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119719.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 65-67).
In this thesis, we study the robustness of complex supply chain systems from a network science perspective. Through the simulation of targeted attacks to nodes and edges using different hierarchical measures from network science to select the most relevant components, we evaluate the extent to which local centrality measures can estimate the relevance of a node in maintaining the connectivity and the efficient communication across the network. We perform the experiments on two real-world supply chain data sets, and on an ensemble of networks generated from network growth models that share simple topological properties with the real-world networks. It is found that all models produce more robust networks than the data sets of choice. In addition, the removal of high average neighbor degree nodes seems to have little impact on the connectivity of the network, and a highly varying impact on the efficiency of the network. Finally, robustness against targeted node and edge removal is found to be more associated to the number of nodes and links in the network than to more complex network measures such as the degree distribution.
by María Ximena Rueda Guerrero.
M. Eng.
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Texto completoIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Sheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Texto completoIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Tan, Chow Yin 1973. "Supply-chain software systems : current issues and imperatives in selection and implementation". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.
Texto completoRouse, Vicki Henderson. "An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company". Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.
Texto completoArunachalam, Raghu. "An agent based compositional framework for supply chain simulation". Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.
Texto completoBredenkamp, Frederick van Biljon. "The development of a generic just-in-time supply chain optimisation software tool /". Link to the online version, 2005. http://hdl.handle.net/10019/980.
Texto completoBredenkamp, F. v. B. "The development of a generic just-in-time supply chain optimisation software tool". Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.
Texto completoPippow, Ingo. "Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten /". Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.
Texto completoLibros sobre el tema "Software Supply Chain Attacks"
Enterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Buscar texto completoStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
Buscar texto completoHartmut, Stadtler y Kilger Christoph 1965-, eds. Supply chain management and advanced planning: Concepts, models, software, and case studies. 2a ed. Berlin ; New York: Springer, 2002.
Buscar texto completoStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
Buscar texto completoValverde, Raul. Information systems reengineering for modern business systems: ERP, supply chain and e-commerce management solutions. Hershey, PA: Information Science Reference, 2012.
Buscar texto completoKang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control: Method, Software and Industrial Application. London: Springer London, 2013.
Buscar texto completoLuo, Zongwei. Mechanism Design for Sustainability: Techniques and Cases. Dordrecht: Springer Netherlands, 2013.
Buscar texto completoKovalenko, Vladimir. Design of information systems. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/987869.
Texto completoSupply Chain Forecasting Software. SCM Focus Press, 2012.
Buscar texto completoDisclosure of Software Supply Chain Risks. RAND Corporation, 2022. http://dx.doi.org/10.7249/pea2072-1.
Texto completoCapítulos de libros sobre el tema "Software Supply Chain Attacks"
Ohm, Marc, Henrik Plate, Arnold Sykosch y Michael Meier. "Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks". En Detection of Intrusions and Malware, and Vulnerability Assessment, 23–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_2.
Texto completoQuante, Rainer, Herbert Meyr y Moritz Fleischmann. "Revenue management and demand fulfillment: matching applications, models and software". En Supply Chain Planning, 57–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-93775-3_3.
Texto completoGuillén-Gosálbez, Gonzalo y Fengqi You. "Plant Location: Supply Chain Management". En Introduction to Software for Chemical Engineers, 669–80. Second edition. | Boca Raton, FL: CRC Press/Taylor & Francis: CRC Press, 2019. http://dx.doi.org/10.1201/9780429451010-16.
Texto completoBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO". En Integriertes Supply Chain Management, 235–59. Wiesbaden: Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-663-10380-6_12.
Texto completoBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO". En Integriertes Supply Chain Management, 259–83. Wiesbaden: Gabler Verlag, 2004. http://dx.doi.org/10.1007/978-3-663-10381-3_13.
Texto completoMüller, Jörg P., Bernhard Bauer, Thomas Friese, Stephan Roser y Roland Zimmermann. "Software Agents for Electronic Business: Opportunities and Challenges (2005 Re-mix)". En Multiagent based Supply Chain Management, 63–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33876-5_3.
Texto completoHanne, Thomas y Rolf Dornberger. "Intelligent Software for Logistics". En Computational Intelligence in Logistics and Supply Chain Management, 153–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40722-7_7.
Texto completoHanne, Thomas y Rolf Dornberger. "Intelligente Software für die Logistik". En Computational Intelligence in Logistik und Supply Chain Management, 163–80. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21452-3_7.
Texto completoKortus-Schultes, Doris y Ute Ferfer. "Beschleunigungsfaktoren im Management von Supply Chains: Software-Werkzeuge". En Logistik und Marketing in der Supply Chain, 77–79. Wiesbaden: Gabler Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-82301-4_8.
Texto completoEspinoza-Mejía, Mauricio, Víctor Saquicela y Victoria Abril-Ulloa. "Ensuring Traceability and Orchestration in the Food Supply Chain". En Artificial Intelligence, Computer and Software Engineering Advances, 135–49. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68080-0_10.
Texto completoActas de conferencias sobre el tema "Software Supply Chain Attacks"
Hossain Faruk, Md Jobair, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman y Fan Wu. "Investigating Novel Approaches to Defend Software Supply Chain Attacks". En 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2022. http://dx.doi.org/10.1109/issrew55968.2022.00081.
Texto completoWang, Xinyuan. "On the Feasibility of Detecting Software Supply Chain Attacks". En MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9652901.
Texto completoOhm, Marc, Arnold Sykosch y Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts". En ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Texto completoVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate y Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks". En CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Texto completoCoram, Michael. "Anatomy of a Software Supply Chain Attack." En Proposed for presentation at the NLIT Summit 2020 held October 13-16, 2020 in virtual, virtual, virtual. US DOE, 2020. http://dx.doi.org/10.2172/1825030.
Texto completoMasum, Mohammad, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin et al. "Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?" En 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00097.
Texto completoYan, Dapeng, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu y Tegawende F. Bissyande. "Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain". En 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2021. http://dx.doi.org/10.1109/qrs54544.2021.00060.
Texto completoCoufalikova, Aneta, Ivo Klaban y Tomas Slajs. "Complex strategy against supply chain attacks". En 2021 International Conference on Military Technologies (ICMT). IEEE, 2021. http://dx.doi.org/10.1109/icmt52455.2021.9502768.
Texto completoSingi, Kapil, Jagadeesh Chandra Bose R P, Sanjay Podder y Adam P. Burden. "Trusted Software Supply Chain". En 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2019. http://dx.doi.org/10.1109/ase.2019.00141.
Texto completoLudvigsen, Kaspar Rosager, Shishir Nagaraja y Angela Daly. "Preventing or Mitigating Adversarial Supply Chain Attacks". En CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564552.
Texto completoInformes sobre el tema "Software Supply Chain Attacks"
Visker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, abril de 2000. http://dx.doi.org/10.21236/ada378230.
Texto completoChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek y Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), noviembre de 2016. http://dx.doi.org/10.2172/1329799.
Texto completoChandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Texto completoLindquist, Joachim y Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Texto completoLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, junio de 2021. http://dx.doi.org/10.51593/2020ca013.
Texto completoHicks, Julie, Laurin Yates y Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), septiembre de 2021. http://dx.doi.org/10.21079/11681/41867.
Texto completoCoyner, Kelley y Jason Bittner. Automated Vehicles and Infrastructure Enablers. SAE International, marzo de 2022. http://dx.doi.org/10.4271/epr2022008.
Texto completo