Littérature scientifique sur le sujet « Software Supply Chain Attacks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Software Supply Chain Attacks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Software Supply Chain Attacks"
Martínez, Jeferson, et Javier M. Durán. « Software Supply Chain Attacks, a Threat to Global Cybersecurity : SolarWinds’ Case Study ». International Journal of Safety and Security Engineering 11, no 5 (31 octobre 2021) : 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Texte intégralКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин et Николай Алексеевич Ююкин. « ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no 1(-) (5 avril 2022) : 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Texte intégralWatney, Murdoch. « Cybersecurity Threats to and Cyberattacks on Critical Infrastructure : a Legal Perspective ». European Conference on Cyber Warfare and Security 21, no 1 (8 juin 2022) : 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Texte intégralKaczorowski, Maya, Falcon Momot, George V. Neville-Neil et Chris McCubbin. « OSS Supply-chain Security : What Will It Take ? » Queue 20, no 5 (31 octobre 2022) : 86–102. http://dx.doi.org/10.1145/3570923.
Texte intégralChetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed et Mustafa M. Kadhim. « Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors ». Foundations of Computing and Decision Sciences 47, no 4 (1 décembre 2022) : 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.
Texte intégralZhou, Chencheng, Liudong Xing, Qisi Liu et Honggang Wang. « Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation ». International Journal of Mathematical, Engineering and Management Sciences 6, no 2 (1 avril 2021) : 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.
Texte intégralTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur et Atef Zaguia. « Smart Supply Chain Management Using the Blockchain and Smart Contract ». Scientific Programming 2021 (28 septembre 2021) : 1–12. http://dx.doi.org/10.1155/2021/6092792.
Texte intégralJohnson, Chris, et Maria Evangelopoulou. « Defending Against Firmware Cyber Attacks on Safety-Critical Systems ». Journal of System Safety 54, no 1 (1 avril 2018) : 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.
Texte intégralLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty et Ankur Srivastava. « Robust and Attack Resilient Logic Locking with a High Application-Level Impact ». ACM Journal on Emerging Technologies in Computing Systems 17, no 3 (11 mai 2021) : 1–22. http://dx.doi.org/10.1145/3446215.
Texte intégralShinkar, Sonali V., et Dolly Thankachan. « SCMBQA : Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios ». International Journal on Recent and Innovation Trends in Computing and Communication 10, no 1s (10 décembre 2022) : 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Texte intégralThèses sur le sujet "Software Supply Chain Attacks"
Vu, Duc Ly. « Towards Understanding and Securing the OSS Supply Chain ». Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Texte intégralRueda, Guerrero María Ximena. « Robustness of complex supply chain networks to targeted attacks ». Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119719.
Texte intégralThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 65-67).
In this thesis, we study the robustness of complex supply chain systems from a network science perspective. Through the simulation of targeted attacks to nodes and edges using different hierarchical measures from network science to select the most relevant components, we evaluate the extent to which local centrality measures can estimate the relevance of a node in maintaining the connectivity and the efficient communication across the network. We perform the experiments on two real-world supply chain data sets, and on an ensemble of networks generated from network growth models that share simple topological properties with the real-world networks. It is found that all models produce more robust networks than the data sets of choice. In addition, the removal of high average neighbor degree nodes seems to have little impact on the connectivity of the network, and a highly varying impact on the efficiency of the network. Finally, robustness against targeted node and edge removal is found to be more associated to the number of nodes and links in the network than to more complex network measures such as the degree distribution.
by María Ximena Rueda Guerrero.
M. Eng.
Holt, Christopher Michael Taylor 1968. « Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management ». Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Texte intégralIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Sheinbein, Rachel Felice 1975. « Applying supply chain methodology to a centralized software licensing strategy ». Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Texte intégralIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Tan, Chow Yin 1973. « Supply-chain software systems : current issues and imperatives in selection and implementation ». Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.
Texte intégralRouse, Vicki Henderson. « An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company ». Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.
Texte intégralArunachalam, Raghu. « An agent based compositional framework for supply chain simulation ». Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.
Texte intégralBredenkamp, Frederick van Biljon. « The development of a generic just-in-time supply chain optimisation software tool / ». Link to the online version, 2005. http://hdl.handle.net/10019/980.
Texte intégralBredenkamp, F. v. B. « The development of a generic just-in-time supply chain optimisation software tool ». Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.
Texte intégralPippow, Ingo. « Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten / ». Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.
Texte intégralLivres sur le sujet "Software Supply Chain Attacks"
Enterprise software delivery : Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ : Addison-Wesley, 2013.
Trouver le texte intégralStadtler, Hartmut. Supply Chain Management and Advanced Planning : Concepts, Models, Software and Case Studies. Berlin, Heidelberg : Springer Berlin Heidelberg, 2000.
Trouver le texte intégralHartmut, Stadtler, et Kilger Christoph 1965-, dir. Supply chain management and advanced planning : Concepts, models, software, and case studies. 2e éd. Berlin ; New York : Springer, 2002.
Trouver le texte intégralStadtler, Hartmut. Supply Chain Management and Advanced Planning : Concepts, Models, Software and Case Studies. Berlin, Heidelberg : Springer Berlin Heidelberg, 2002.
Trouver le texte intégralValverde, Raul. Information systems reengineering for modern business systems : ERP, supply chain and e-commerce management solutions. Hershey, PA : Information Science Reference, 2012.
Trouver le texte intégralKang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control : Method, Software and Industrial Application. London : Springer London, 2013.
Trouver le texte intégralLuo, Zongwei. Mechanism Design for Sustainability : Techniques and Cases. Dordrecht : Springer Netherlands, 2013.
Trouver le texte intégralKovalenko, Vladimir. Design of information systems. ru : INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/987869.
Texte intégralSupply Chain Forecasting Software. SCM Focus Press, 2012.
Trouver le texte intégralDisclosure of Software Supply Chain Risks. RAND Corporation, 2022. http://dx.doi.org/10.7249/pea2072-1.
Texte intégralChapitres de livres sur le sujet "Software Supply Chain Attacks"
Ohm, Marc, Henrik Plate, Arnold Sykosch et Michael Meier. « Backstabber’s Knife Collection : A Review of Open Source Software Supply Chain Attacks ». Dans Detection of Intrusions and Malware, and Vulnerability Assessment, 23–43. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_2.
Texte intégralQuante, Rainer, Herbert Meyr et Moritz Fleischmann. « Revenue management and demand fulfillment : matching applications, models and software ». Dans Supply Chain Planning, 57–88. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-93775-3_3.
Texte intégralGuillén-Gosálbez, Gonzalo, et Fengqi You. « Plant Location : Supply Chain Management ». Dans Introduction to Software for Chemical Engineers, 669–80. Second edition. | Boca Raton, FL : CRC Press/Taylor & Francis : CRC Press, 2019. http://dx.doi.org/10.1201/9780429451010-16.
Texte intégralBick, Michael. « Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO ». Dans Integriertes Supply Chain Management, 235–59. Wiesbaden : Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-663-10380-6_12.
Texte intégralBick, Michael. « Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO ». Dans Integriertes Supply Chain Management, 259–83. Wiesbaden : Gabler Verlag, 2004. http://dx.doi.org/10.1007/978-3-663-10381-3_13.
Texte intégralMüller, Jörg P., Bernhard Bauer, Thomas Friese, Stephan Roser et Roland Zimmermann. « Software Agents for Electronic Business : Opportunities and Challenges (2005 Re-mix) ». Dans Multiagent based Supply Chain Management, 63–102. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33876-5_3.
Texte intégralHanne, Thomas, et Rolf Dornberger. « Intelligent Software for Logistics ». Dans Computational Intelligence in Logistics and Supply Chain Management, 153–69. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40722-7_7.
Texte intégralHanne, Thomas, et Rolf Dornberger. « Intelligente Software für die Logistik ». Dans Computational Intelligence in Logistik und Supply Chain Management, 163–80. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21452-3_7.
Texte intégralKortus-Schultes, Doris, et Ute Ferfer. « Beschleunigungsfaktoren im Management von Supply Chains : Software-Werkzeuge ». Dans Logistik und Marketing in der Supply Chain, 77–79. Wiesbaden : Gabler Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-82301-4_8.
Texte intégralEspinoza-Mejía, Mauricio, Víctor Saquicela et Victoria Abril-Ulloa. « Ensuring Traceability and Orchestration in the Food Supply Chain ». Dans Artificial Intelligence, Computer and Software Engineering Advances, 135–49. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68080-0_10.
Texte intégralActes de conférences sur le sujet "Software Supply Chain Attacks"
Hossain Faruk, Md Jobair, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman et Fan Wu. « Investigating Novel Approaches to Defend Software Supply Chain Attacks ». Dans 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2022. http://dx.doi.org/10.1109/issrew55968.2022.00081.
Texte intégralWang, Xinyuan. « On the Feasibility of Detecting Software Supply Chain Attacks ». Dans MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9652901.
Texte intégralOhm, Marc, Arnold Sykosch et Michael Meier. « Towards detection of software supply chain attacks by forensic artifacts ». Dans ARES 2020 : The 15th International Conference on Availability, Reliability and Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Texte intégralVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate et Antonino Sabetta. « Towards Using Source Code Repositories to Identify Software Supply Chain Attacks ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Texte intégralCoram, Michael. « Anatomy of a Software Supply Chain Attack. » Dans Proposed for presentation at the NLIT Summit 2020 held October 13-16, 2020 in virtual, virtual, virtual. US DOE, 2020. http://dx.doi.org/10.2172/1825030.
Texte intégralMasum, Mohammad, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin et al. « Quantum Machine Learning for Software Supply Chain Attacks : How Far Can We Go ? » Dans 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00097.
Texte intégralYan, Dapeng, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu et Tegawende F. Bissyande. « Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain ». Dans 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2021. http://dx.doi.org/10.1109/qrs54544.2021.00060.
Texte intégralCoufalikova, Aneta, Ivo Klaban et Tomas Slajs. « Complex strategy against supply chain attacks ». Dans 2021 International Conference on Military Technologies (ICMT). IEEE, 2021. http://dx.doi.org/10.1109/icmt52455.2021.9502768.
Texte intégralSingi, Kapil, Jagadeesh Chandra Bose R P, Sanjay Podder et Adam P. Burden. « Trusted Software Supply Chain ». Dans 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2019. http://dx.doi.org/10.1109/ase.2019.00141.
Texte intégralLudvigsen, Kaspar Rosager, Shishir Nagaraja et Angela Daly. « Preventing or Mitigating Adversarial Supply Chain Attacks ». Dans CCS '22 : 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3560835.3564552.
Texte intégralRapports d'organisations sur le sujet "Software Supply Chain Attacks"
Visker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA : Defense Technical Information Center, avril 2000. http://dx.doi.org/10.21236/ada378230.
Texte intégralChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek et Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), novembre 2016. http://dx.doi.org/10.2172/1329799.
Texte intégralChandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD : National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Texte intégralLindquist, Joachim, et Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning : How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Texte intégralLohn, Andrew. Poison in the Well : Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, juin 2021. http://dx.doi.org/10.51593/2020ca013.
Texte intégralHicks, Julie, Laurin Yates et Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), septembre 2021. http://dx.doi.org/10.21079/11681/41867.
Texte intégralCoyner, Kelley, et Jason Bittner. Automated Vehicles and Infrastructure Enablers. SAE International, mars 2022. http://dx.doi.org/10.4271/epr2022008.
Texte intégral