Articles de revues sur le sujet « Software Supply Chain Attacks »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Software Supply Chain Attacks.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Software Supply Chain Attacks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Martínez, Jeferson, et Javier M. Durán. « Software Supply Chain Attacks, a Threat to Global Cybersecurity : SolarWinds’ Case Study ». International Journal of Safety and Security Engineering 11, no 5 (31 octobre 2021) : 537–45. http://dx.doi.org/10.18280/ijsse.110505.

Texte intégral
Résumé :
Exploitation of a vulnerability that compromised the source code of the Solar Winds’ Orion system, a software that is used widely by different government and industry actors in the world for the administration and monitoring of networks; brought to the fore a type of stealth attack that has been gaining momentum: supply chain attacks. The main problem in the violation of the software supply chain is that, from 85% to 97% of the code currently used in the software development industry comes from the reuse of open source code frameworks, repositories of third-party software and APIs, creating potential vulnerabilities in the development cycle of a software product. This research analyzes the SolarWinds case study from an exploratory review of academic literature, government information, but also from the articles and reports that are published by different cybersecurity consulting firms and software providers. Then, a set of good practices is proposed such as: Zero trust, Multi-Factor authentication mechanisms (MFA), strategies such as SBOM and the recommendations of the CISA guide to defend against this type of attack. Finally, the research discusses about how to improve response times and prevention against this type of attacks, also future research related to the subject is suggested, such as the application of Machine Learning and Blockchain technologies. Additionally for risk reduction, in addition to the management and articulation of IT teams that participate in all the actors that are part of the software life cycle under a DevSecOps approach.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Куликов, Сергей Сергеевич, Владимир Иванович Белоножкин et Николай Алексеевич Ююкин. « ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no 1(-) (5 avril 2022) : 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.

Texte intégral
Résumé :
В данной статье представлен анализ угроз информационной безопасности, связанных с атаками на цепи поставок, которые могут использоваться для нарушения информационной безопасности организации без прямых воздействий на ее информационно-технологическую инфраструктуру. В контексте информационной безопасности, атака на цепь поставки предполагает целенаправленные злоумышленные воздействия на активы поставщика с целью последующего нарушения информационной безопасности потребителя. Этот тип атак сегодня приобретает особую актуальность как наиболее эффективный среди всего множества угроз информационной безопасности ввиду принципиальных особенностей, существенно затрудняющих противодействие им: возможность злоумышленника по выбору наиболее незащищенного элемента для атаки, необходимость координации действий нескольких организационных структур для противодействия таким атакам, устранения последствий от их реализации и расследования их причин. Также приведен анализ научной, методической и технической литературы, описывающей сценарии известных атак на цепи поставок программного и аппаратного обеспечения. This article presents an analysis of information security threats associated with attacks on the supply chain, which can be used to violate the information security of an organization without direct impacts on its information technology infrastructure. In the context of information security, an attack on the supply chain involves targeted malicious impacts on the supplier's assets with the aim of further violating the consumer's information security. This type of attacks is becoming particularly relevant today as the most effective among all the many threats to information security due to the fundamental features that significantly complicate countering them: the possibility of choosing the most unprotected element of the chain for an attack, the need to coordinate the actions of several organizational structures to counter such attacks, eliminate the consequences of their implementation and investigate their causes. The analysis of scientific, methodological and technical literature describing scenarios of known attacks on the supply chain of software and hardware is also given.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Watney, Murdoch. « Cybersecurity Threats to and Cyberattacks on Critical Infrastructure : a Legal Perspective ». European Conference on Cyber Warfare and Security 21, no 1 (8 juin 2022) : 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.

Texte intégral
Résumé :
Over the years cybersecurity threats to and cyberattacks on the critical infrastructure by state and non-state actors have escalated in intensity and sophistication. Cyberattacks, such as the 2017 NotPetya ransomware attack, the 2020 SolarWinds software supply chain attack and the 2021 Colonial Pipeline ransomware attack, illustrate the vulnerability of critical infrastructure to cyberattacks. Most cyberattacks are committed across borders involving criminal hackers or state supported hackers. Furthermore, critical infrastructure is increasingly interconnected and interdependent. Connectivity brings about the risk of a cyberattack, demonstrated by the 2021 Colonial Pipeline ransomware attack. Interconnectedness also means that the compromise of one critical infrastructure asset can have a domino effect that degrades or disrupts others and results in cascading consequences across the economy and national security. Operational continuity is essential and this may have been one of the reasons why Colonial Pipeline paid a ransom to cyber-attackers. A cyberattack on the critical infrastructure of a state cannot be seen in isolation as the consequences of the attack may impact other states, this was illustrated by the 2017 WannaCry and NotPetya ransomware attacks. The level of sophistication of cyberattacks has increased over the years as shown by the 2020 SolarWinds software supply chain attack. The escalation of attacks has served as a catalyst for governments to address the risk to critical infrastructure. Countries need to have strong government bodies which supervise cybersecurity in their country and work together with their counterparts in other countries by sharing information regarding threats and attacks against critical infrastructure. The discussion focuses on the challenges that threats to and attacks on critical infrastructure present, the possible solutions a government may implement in addressing cyberattacks on critical infrastructure and the accountability of state and non-state actors of cyberattacks on critical infrastructure. The issues are discussed from a legal perspective.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kaczorowski, Maya, Falcon Momot, George V. Neville-Neil et Chris McCubbin. « OSS Supply-chain Security : What Will It Take ? » Queue 20, no 5 (31 octobre 2022) : 86–102. http://dx.doi.org/10.1145/3570923.

Texte intégral
Résumé :
While enterprise security teams naturally tend to turn their focus primarily to direct attacks on their own infrastructure, cybercrime exploits now are increasingly aimed at easier targets upstream. This has led to a perfect storm, since virtually all significant codebase repositories at this point include at least some amount of open-source software. But opportunities also abound there for the authors of malware. The broader cybercrime world, meanwhile, has noted that open-source supply chains are generally easy to penetrate. What's being done at this point to address the apparent risks?
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed et Mustafa M. Kadhim. « Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors ». Foundations of Computing and Decision Sciences 47, no 4 (1 décembre 2022) : 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.

Texte intégral
Résumé :
Abstract With the globalization of markets and increasing competition in global markets, the attempts of organizations to survive in this market has increased and has resulted in the emergence of the philosophy of Supply Chain Management. There is uncertainty in the reliability of supply chain facilities for reasons such as natural disasters, terrorist attacks, labor errors, and weather conditions. Therefore, when making strategic decisions, the system will continue to operate with minimal damage. Over the course of this study, the uncertainty of supplier layers in the supply chain has been modeled. To meet that aim, the issue of supply chain, including producers, warehouses, suppliers and consumers are considered. To calculate the cost of breakdowns due to the non-functioning of distributors, the scenario-building method has been utilized. Finally, the desired model is solved with Gomez software and the results are presented. The result of the study demonstrate the efficiency of this model in the facility location decision-making in supply chains.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhou, Chencheng, Liudong Xing, Qisi Liu et Honggang Wang. « Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation ». International Journal of Mathematical, Engineering and Management Sciences 6, no 2 (1 avril 2021) : 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.

Texte intégral
Résumé :
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of these applications, it is pivotal to model and evaluate dependability of the block chain-based systems, contributing to their reliable and robust operation. This paper models and analyzes the dependability of Bitcoin nodes subject to Eclipse attacks and state-dependent mitigation activities. Built upon the block chain technology, the Bitcoin is a peer-to-peer cryptocurrency system enabling an individual user to trade freely without the involvement of banks or any other types of intermediate agents. However, a node in the Bitcoin is vulnerable to the Eclipse attack, which aims to monopolize the information flow of the victim node. A semi-Markov process (SMP) based approach is proposed to model the Eclipse attack behavior and possible mitigation activities that may prevent the attack from being successful during the attack process. The SMP model is then evaluated to determine the steady-state dependability of the Bitcoin node. Numerical examples are provided to demonstrate the influence of the time to restart the Bitcoin software and time to detect and delete the malicious message on the Bitcoin node dependability.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Turjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur et Atef Zaguia. « Smart Supply Chain Management Using the Blockchain and Smart Contract ». Scientific Programming 2021 (28 septembre 2021) : 1–12. http://dx.doi.org/10.1155/2021/6092792.

Texte intégral
Résumé :
The manufacture of raw materials to deliver the product to the consumer in a traditional supply chain system is a manual process with insufficient data and transaction security. It also takes a significant amount of time, making the entire procedure lengthy. Overall, the undivided process is ineffective and untrustworthy for consumers. If blockchain and smart contract technologies are integrated into traditional supply chain management systems, data security, authenticity, time management, and transaction processes will all be significantly improved. Blockchain is a revolutionary, decentralized technology that protects data from unauthorized access. The entire supply chain management (SCM) will be satisfied with the consumer once smart contracts are implemented. The plan becomes more trustworthy when the mediator is contracted, which is doable in these ways. The tags employed in the conventional SCM process are costly and have limited possibilities. As a result, it is difficult to maintain product secrecy and accountability in the SCM scheme. It is also a common target for wireless attacks (reply attacks, eavesdropping, etc.). In SCM, the phrase “product confidentiality” is very significant. It means that only those who have been validated have access to the information. This paper emphasizes reducing the involvement of third parties in the supply chain system and improving data security. Traditional supply chain management systems have a number of significant flaws. Lack of traceability, difficulty maintaining product safety and quality, failure to monitor and control inventory in warehouses and shops, rising supply chain expenses, and so on, are some of them. The focus of this paper is on minimizing third-party participation in the supply chain system and enhancing data security. This improves accessibility, efficiency, and timeliness throughout the whole process. The primary advantage is that individuals will feel safer throughout the payment process. However, in this study, a peer-to-peer encrypted system was utilized in conjunction with a smart contract. Additionally, there are a few other features. Because this document makes use of an immutable ledger, the hacker will be unable to get access to it. Even if they get access to the system, they will be unable to modify any data. If the goods are defective, the transaction will be halted, and the customer will be reimbursed, with the seller receiving the merchandise. By using cryptographic methods, transaction security will be a feasible alternative for recasting these issues. Finally, this paper will demonstrate how to maintain the method with the maximum level of safety, transparency, and efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Johnson, Chris, et Maria Evangelopoulou. « Defending Against Firmware Cyber Attacks on Safety-Critical Systems ». Journal of System Safety 54, no 1 (1 avril 2018) : 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.

Texte intégral
Résumé :
In the past, it was not possible to update the underlying software in many industrial control devices. Engineering teams had to “rip and replace” obsolete components. However, the ability to make firmware updates has provided significant benefits to companies who use Programmable Logic Controllers (PLCs), switches, gateways and bridges, as well as an array of smart sensor/actuators. While these updates — which include security patches when vulnerabilities are identified in existing devices — can be distributed by physical media, they are increasingly downloaded over Internet connections. These mechanisms pose a growing threat to the cyber security of safety-critical applications, which is illustrated by recent attacks on safety-related infrastructures across the Ukraine. This paper explains how malware can be distributed within firmware updates. Even when attackers cannot reverse engineer the code necessary to disguise their attack, they can undermine a device by forcing it into a constant upload cycle in which the firmware installation never terminates. In this paper, we present means of mitigating the risks of firmware attacks on safety-critical systems as part of wider initiatives to secure national critical infrastructures. Technical solutions, including firmware hashing, must be augmented by organizational measures to secure the supply chain within individual plants, across companies and throughout safety-related industries.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Liu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty et Ankur Srivastava. « Robust and Attack Resilient Logic Locking with a High Application-Level Impact ». ACM Journal on Emerging Technologies in Computing Systems 17, no 3 (11 mai 2021) : 1–22. http://dx.doi.org/10.1145/3446215.

Texte intégral
Résumé :
Logic locking is a hardware security technique aimed at protecting intellectual property against security threats in the IC supply chain, especially those posed by untrusted fabrication facilities. Such techniques incorporate additional locking circuitry within an integrated circuit (IC) that induces incorrect digital functionality when an incorrect verification key is provided by a user. The amount of error induced by an incorrect key is known as the effectiveness of the locking technique. A family of attacks known as “SAT attacks” provide a strong mathematical formulation to find the correct key of locked circuits. To achieve high SAT resilience (i.e., complexity of SAT attacks), many conventional logic locking schemes fail to inject sufficient error into the circuit when the key is incorrect. For example, in the case of SARLock and Anti-SAT, there are usually very few (or only one) input minterms that cause any error at the circuit output. The state-of-the-art s tripped functionality logic locking (SFLL) technique provides a wide spectrum of configurations that introduced a tradeoff between SAT resilience and effectiveness. In this work, we prove that such a tradeoff is universal among all logic locking techniques. To attain high effectiveness of locking without compromising SAT resilience, we propose a novel logic locking scheme, called Strong Anti-SAT (SAS). In addition to SAT attacks, removal-based attacks are another popular kind of attack formulation against logic locking where the attacker tries to identify and remove the locking structure. Based on SAS, we also propose Robust SAS (RSAS) that is resilient to removal attacks and maintains the same SAT resilience and effectiveness as SAS. SAS and RSAS have the following significant improvements over existing techniques. (1) We prove that the SAT resilience of SAS and RSAS against SAT attack is not compromised by increase in effectiveness . (2) In contrast to prior work that focused solely on the circuit-level locking impact, we integrate SAS-locked modules into an 80386 processor and show that SAS has a high application-level impact. (3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and their effectiveness is similar to SFLL.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Shinkar, Sonali V., et Dolly Thankachan. « SCMBQA : Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios ». International Journal on Recent and Innovation Trends in Computing and Communication 10, no 1s (10 décembre 2022) : 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.

Texte intégral
Résumé :
Storing& processing data for supply chain management (SCM) systems requires design of high-security and quality of service (QoS) aware models. These modelsassist in improving traceability performance of SCM deployments via integration of transparent & distributed mechanisms. A wide variety of security models are proposed by researchers to perform these tasks, and it is observed that blockchain-based SCM implementations outperform other models in terms of security & QoS metrics.But most of these implementationsare general-purpose and do not incorporate SCM-specific consensus & mining rules. It is also observed that, mining speed& throughput performance of these blockchain-based implementations reduces exponentially w.r.t. number of SCM transactions. To resolve these issues, this paper discusses design of a novel Proof-of-Supply Chain (PoSC) based consensus model, which is specifically designed for sidechain based SCM deployments. The PoSC consensus model is used for high-efficiency SCM-based data storage and communication scenarios. The proposed PoSC consensus model is capable of resisting selfish mining, time jacking, and sybil attacks, which are targeted towards SCM deployments. The model uses temporal performance metrics of miner nodes, and combines them with relationship graphs to form an SCM miner rank. Based on this rank, miner nodes are selected, and their consensus responses are recorded. These responses are processed using an augmented deep learning model, that is trained over 8 different SCM implementations via machine learning. After successful mining, responses obtained from these miners are used to incrementally train the machine learning model which assists in continuous performance improvement. The SCMBQA model was tested on milk supply chain, agriculture supply chain, and electronic supply chain applications, in terms of computational speed, throughput, energy requirement, retrieval & verification delay, and storage requirements. It was observed that the proposed PoSC consensus was capable of improving the computational speed by 8.5%, reduce energy consumption by 4.9%, improve throughput by 9.6%, and reduce storage costs by 15.4% when compared with standard blockchain-based SCM consensus models. This is because the proposed model deploys an intelligent sidechaining approach, that is capable of optimizing number of generated sidechains via temporal QoS & security performance metrics. Due to use of smaller chain lengths, the proposed model is capable of integrating privacy-aware & secure approaches depending upon different SCM stages. Thus, distributor-level security models are different than retailer-level security models, which assists in context-sensitive block deployments. Due to use of PoSC, the proposed model was observed to be 99.5% resilient against internal and external attacks, which makes it useful for real-time SCM deployments.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Kajtez, Nemanja, Yue Zhang et Basel Halak. « Lockit : A Logic Locking Automation Software ». Electronics 10, no 22 (17 novembre 2021) : 2817. http://dx.doi.org/10.3390/electronics10222817.

Texte intégral
Résumé :
The significant rise in the cost of manufacturing nanoscale integrated circuits (ICs) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. The multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat these, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches has been rather slow due to the lack of integration with the IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist, which can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile when trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Paul, Shubhra Deb, et Swarup Bhunia. « SILVerIn : Systematic Integrity Verification of Printed Circuit Board Using JTAG Infrastructure ». ACM Journal on Emerging Technologies in Computing Systems 17, no 3 (25 juin 2021) : 1–28. http://dx.doi.org/10.1145/3460232.

Texte intégral
Résumé :
A printed circuit board (PCB) provides necessary mechanical support to an electronic system and acts as a platform for connecting electronic components. Counterfeiting and in-field tampering of PCBs have become significant security concerns in the semiconductor industry as a result of increasing untrusted entities in the supply chain. These counterfeit components may result in performance degradation, profit reduction, and reputation risk for the manufacturers. While Integrated Circuit (IC) level authentication using physical unclonable functions (PUFs) has been widely investigated, countermeasures at the PCB level are scarce. These approaches either suffer from significant overhead issues, or opportunistic counterfeiters can breach them like clockwork. Besides, they cannot be extended to system-level (both chip and PCB together), and their applications are also limited to a specific purpose (i.e., either counterfeiting or tampering). In this article, we introduce SILVerIn , a novel systematic approach to verify the authenticity of all chips used in a PCB as well as the board for combating attacks such as counterfeiting, cloning, and in-field malicious modifications. We develop this approach by utilizing the existing boundary scan architecture (BSA) of modern ICs and PCBs. As a result, its implementation comes at a negligible (∼0.5%) hardware overhead. SILVerIn is integrated into a PCB design during the manufacturing phase. We implement our technique on a custom hardware platform consisting of an FPGA and a microcontroller. We incorporate the industry-standard JTAG (Joint Test Action Group) interface to transmit test data into the BSA and perform hands-on measurement of supply current at both chip and PCB levels on 20 boards. We reconstruct these current values to digital signatures that exhibit high uniqueness, robustness, and randomness features. Our approach manifests strong reproducibility of signatures at different supply voltage levels, even with a low-resolution measurement setup. SILVerIn also demonstrates a high resilience against machine learning-based modeling attacks, with an average prediction accuracy of ∼51%. Finally, we conduct intentional alteration experiments by replacing the on-board FPGA to replicate the scenario of PCB tampering, and the results indicate successful detection of in-field modifications in a PCB.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Seth, Dinesh, Nitin Seth et Deepak Goel. « Application of value stream mapping (VSM) for minimization of wastes in the processing side of supply chain of cottonseed oil industry in Indian context ». Journal of Manufacturing Technology Management 19, no 4 (2 mai 2008) : 529–50. http://dx.doi.org/10.1108/17410380810869950.

Texte intégral
Résumé :
PurposeThe purpose of this paper is to identify and address various wastes in the supply chain of the edible cottonseed oil industry (specifically the processing side) using a value stream mapping (VSM) approach to improve productivity and capacity utilization in an Indian context.Design/methodology/approachCritical observations and interviewing techniques were used with open‐ended questions to understand the processes involved in the value chain of the cottonseed oil industry. Different chain links/members were investigated through personal visits and discussions. VSM is applied as an approach to the industry to identify and remove non‐value‐adding (NVA) activities.FindingsMajor findings obtained from the study are as follows. There is an excess cumulative inventory of 244 days in the whole supply chain. The industry is highly fragmented with a large number of small players present, which hampers the use of economies of scale. There are NVA activities present in the supply chain such as the moving of cottonseed oil from expeller mill to refinery. The industry still uses outdated technology which hampers the productivity.Practical implicationsAttention needs to be given to boosting the productivity of the oil sector. Waste removal from the oilseed‐processing sector is one key to improving the productivity of the sector.Originality/valueThe paper addresses the various wastes in the processing side of the supply chain of the Indian cottonseed oil industry, using VSM as an approach which was hardly ever attempted before. Wastes are then individually attacked to reduce or eliminate them from the system. Suggestions to make the whole chain more productive can be generalized and can be replicated in the context of other developing countries.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Zhao, Guangwei, et Kaveh Shamsi. « Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation ». Cryptography 6, no 4 (22 novembre 2022) : 60. http://dx.doi.org/10.3390/cryptography6040060.

Texte intégral
Résumé :
Logic locking is a technique that can help hinder reverse-engineering-based attacks in the IC supply chain from untrusted foundries or end-users. In 2015, the Boolean Satisfiability (SAT) attack was introduced. Although the SAT attack is effective in deobfuscating a wide range of logic locking schemes, its execution time varies widely from a few seconds to months. Previous research has shown that Graph Convolutional Networks (GCN) may be used to estimate this deobfuscation time for locked circuits with varied key sizes. In this paper, we explore whether GCN models truly understand/capture the structural/functional sources of deobfuscation hardness. In order to tackle this, we generate different curated training datasets: traditional ISCAS benchmark circuits locked with varying key sizes, as well as an important novel class of synthetic benchmarks: Substitution-Permutation Networks (SPN), which are circuit structures used to produce the most secure and efficient keyed-functions used today: block-ciphers. We then test whether a GCN trained on a traditional benchmark can predict the simple fact that a deeper SPN is superior to a wide SPN of the same size. We find that surprisingly the GCN model fails at this. We propose to overcome this limitation by proposing a set of circuit features motivated by block-cipher design principles. These features can be used as stand-alone or combined with GCN models to provide deeper topological cues than what GCNs can access.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Deyannis, Dimitris, Eva Papadogiannaki, Grigorios Chrysos, Konstantinos Georgopoulos et Sotiris Ioannidis. « The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of Modern Supply Chains ». Electronics 11, no 13 (22 juin 2022) : 1944. http://dx.doi.org/10.3390/electronics11131944.

Texte intégral
Résumé :
Despite the tremendous socioeconomic importance of supply chains (SCs), security officers and operators are faced with no easy and integrated way for protecting their critical, and interconnected, infrastructures from cyber-attacks. As a result, solutions and methodologies that support the detection of malicious activity on SCs are constantly researched into and proposed. Hence, this work presents the implementation of a low-cost reconfigurable intrusion detection system (IDS), on the edge, that can be easily integrated into SC networks, thereby elevating the featured levels of security. Specifically, the proposed system offers real-time cybersecurity intrusion detection over high-speed networks and services by offloading elements of the security check workloads on dedicated reconfigurable hardware. Our solution uses a novel framework that implements the Aho–Corasick algorithm on the reconfigurable fabric of a multi-processor system-on-chip (MPSoC), which supports parallel matching for multiple network packet patterns. The initial performance evaluation of this proof-of-concept shows that it holds the potential to outperform existing software-based solutions while unburdening SC nodes from demanding cybersecurity check workloads. The proposed system performance and its efficiency were evaluated using a real-life environment in the context of European Union’s Horizon 2020 research and innovation program, i.e., CYRENE.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Duan, Wei, Xuelin Li, Desheng Xu, Hui Ma, Fu Sai et Xi Lian. « ECONOMIC PSYCHOLOGY ANALYSIS OF RECYCLERS' EMOTIONAL STABILITY IN CLOSED-LOOP SUPPLY CHAIN UNDER UNCERTAINTY ». International Journal of Neuropsychopharmacology 25, Supplement_1 (1 juillet 2022) : A55—A56. http://dx.doi.org/10.1093/ijnp/pyac032.077.

Texte intégral
Résumé :
Abstract Background In today's society, with the sustainable development of economy, material products are rich and diverse. The production speed of products has far exceeded people's needs. Emission reduction and environmental protection have become people's new pursuit. Closed loop supply chain should consider not only product life cycle and recycling, but also economic and environmental benefits. It has become the focus of scholars all over the world. Closed loop supply chain refers to the complete supply chain cycle from procurement to final sales, including product recovery and reverse logistics supported by life cycle. It is a highly complex process. In the closed-loop supply chain, the simplest form is composed of manufacturers, retailers and recyclers. Recycler is the most critical link in the new closed-loop supply chain system, which is not available in the traditional supply chain. Therefore, this paper mainly studies the change of recyclers when exogenous variables fluctuate from the perspective of economic psychology. Research Objects and Methods Most scholars use short-term static methods when studying the uncertainty of recyclers in closed-loop supply chain. It is particularly important to analyze the uncertain factors in the closed-loop supply chain. In order to analyze this problem, this paper first improves the closed-loop supply chain model of capital flow and logistics coupling, so as to better simulate the real closed-loop supply chain. Secondly, the sensitivity analysis function of Vensim software is used to simulate the impact of exogenous variables on the inventory value and capital value of recyclers in the closed-loop supply chain model. At the same time, in order to verify the impact of recyclers' emotional stability, this study adopts the following scale. The communication anxiety scale adopts 15 questions of the Interaction Anxiety Scale (IAS) compiled by Leary, with a single dimension and a 5-level score, from 1 to 5 to “very inconsistent”. The higher the score, the greater the degree of social anxiety. The emotion regulation self-efficacy scale adopts the emotion regulation self-efficacy scale (RES) revised by Caprara. The 12 questions are divided into three dimensions: expressing positive emotions, managing depression / pain and self-efficacy of managing anger / anger, with 4 questions in each dimension. A 5-level score is adopted, from 1 to 5, which means “very inconsistent” to “very consistent”. The higher the score, the higher the degree of self-confidence in regulating their emotions. In the study, Cronbach's α The coefficient is 0.80. The aggression scale adopts the aggression scale (bpaq) compiled by Buss and Perry The scale has 29 questions and is divided into four dimensions: physical aggression, verbal aggression, anger and hostility. The higher the score, the stronger the attack. In this study, Cronbach's α The coefficient is 0.85. The depression questionnaire adopts Beck's revised depression Inventory-II (BDI-II). The questionnaire has 21 questions, with a single dimension. The higher the total score, the heavier the degree of depression. The data were obtained by spss19 0 and amos17 0 for analysis. Results the 19 exogenous variables were divided into four categories: Manufacturer related parameters, retailer related parameters, recycler related parameters and other related parameters. The sensitivity of these 19 parameters to recycler inventory and capital in closed-loop supply chain is simulated and analyzed. Through the comparative analysis of sensitivity chart, it can be seen that the manufacturer's inventory adjustment time, the retailer's safety inventory coefficient, the retailer's smoothing time, the retailer's inventory adjustment time, the collector's fixed expenditure and the collector's initial inventory value are positively correlated. And have a significant impact on collectors' inventory and emotional stability. The reason is that appropriate time adjustment helps to reduce work pressure and naturally improve job satisfaction. Conclusion in the closed-loop supply chain, the fluctuation of the same exogenous variable in the same range has a more significant impact on the recycler's inventory than on the recycler's capital. For recyclers, the decline of inventory value has a positive impact on the capital of recyclers, while the decline of capital value has a negative impact on the capital of recyclers. The impact of retailer order smoothing time on recycler inventory and capital is uncertain. Therefore, recyclers should strengthen fund management, establish insurance mechanism and prepare reserves to prevent the impact of external variable fluctuations on recyclers' funds. At the same time, in view of the uncertainty caused by exogenous variables related to manufacturers and retailers on recyclers' funds and inventory, recyclers need to deal with it through information sharing, compensation mechanism, incentive and other ways. Acknowledgements Supported by a project grant from National Natural Science Foundation of China (Grant No.71764019), the National Social Science Foundation of China (Grant No.19BGL187), the Planning Project of Philosophy and Social Science of Inner Mongolia (Grant No.2021NDB082), Inner Mongolia Natural Science Foundation (Grant No.2021MS07016 and 2020MS07020) and Research Center for Resources, Environment and Energy Development Strategic.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Liu, Yang, Yang Zhang, Yongsheng Yang et Yan Ma. « DOCS : A Data Ownership Confirmation Scheme for Distributed Data Trading ». Systems 10, no 6 (19 novembre 2022) : 226. http://dx.doi.org/10.3390/systems10060226.

Texte intégral
Résumé :
Data assets trading can encourage owners to distribute data and achieve large-scale data aggregation to promote the development of the supply chain system. Blockchain is a promising platform for constructing a decentralized data marketplace. The data may face risks in the marketplace, such as illegal theft, malicious tampering, or illegal distribution in the transactions process. The data ownership confirmation in a blockchain-empowered marketplace has attracted much attention in recent years. However, challenges still remain, including maintaining data integrity, traceability of illegal data, and accountability. In this paper, we propose a new data ownership confirmation scheme (DOCS) in the transaction scenario of blockchain-empowered distributed data assets trading. It integrates smart contracts, data-embedding technology, and data fingerprint to realize ownership confirmation and protection of data assets in transactions. DOCS ensures reliable mapping between on-chain data ownership information and off-chain data entities, which assists with the accurate prosecution of the illegal distribution of data assets. We demonstrate that DOCS can have desirable security properties in multiple attack models.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Kannan, R. Rajesh, et S. Vasantha. « COVID 19 Outbreaks on the Growth of Self Servicing Technology Using Digital Payments ». Webology 18, no 2 (23 décembre 2021) : 22–40. http://dx.doi.org/10.14704/web/v18i2/web18305.

Texte intégral
Résumé :
In comparison to any other International crisis, Covid19 was sudden and did not leave much time for individuals or Governments to prepare in terms of the impact it had on healthcare infrastructure or trade-in various sectors. The modern world is highly connected and stopping the inter-country movement of people is very difficult. Given the rapid increase of cases, Covid19 was declared as a pandemic and for lack of any other viable option, most Governments chose the way of locking down the economy. There was little information on how Covid19 spreads mortality rate or recovery rate, etc. Impetus on social distancing forced people to get wary of any contact including the exchange of cash which in turn resulted in the rapid adoption of alternate measures such as digital payments. Supply chain management was badly hit and demand for essential products and services increased significantly. Although overall volumes of digital payments went down due to adverse impact on several sectors, its usage as a replacement of cash increased significantly. This sudden increase and adoption by people who are not technology-savvy gave rise to frauds and cyber-attacks. Thus there arose a need for stringent regulations, the evolution of technology, and enhanced user education. There has been a significant push by the Government for achieving a cashless economy and digital payments surely will provide robust support for this objective. RBI has also proposed a self-regulatory body for digital payment and has taken initiatives like making NEFT available 24*7 and removing applicable charges. There are rising impetus and applications of digital payment technologies in day-to-day and business-related trade transactions.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Buchicchio, Emanuele, Luca Grilli, Eros Capobianco, Salvatore Cipriano et Diego Antonini. « Invisible Supply Chain Attacks Based on Trojan Source ». Computer 55, no 10 (octobre 2022) : 18–25. http://dx.doi.org/10.1109/mc.2022.3190801.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Yudina, Tamara N., Petr S. Lemeshchenko et Elena V. Kupchishina. « Features of New Institutions in The Digital Economy ». Journal of Institutional Studies 14, no 3 (25 septembre 2022) : 031–45. http://dx.doi.org/10.17835/2076-6297.2022.14.3.031-045.

Texte intégral
Résumé :
Digital trust and, simultaneously, global distrust became a topical issue in the context of modern trends in the socioeconomic systems development: informatization, internetization, networkization, digitalization. A. Guterres asserts global distrust as one of the four “horsemen of the apocalypse” that threaten all of humanity at the present time. Vulnerability of Russia's positions in the global information and digital space, represented in the predominance of foreign (primarily Western) software and Chinese hardware, cyber-attacks on strategic infrastructure facilities, leaks and the actual vulnerability of personal data of the population (often almost unhindered access for fraudsters to the personal data of residents and non-residents), actualizes the need to strengthen national information security and, therefore, the perspective of the article. A research of digital trust, coupled with artificial intelligence and cyber, information and digital economic security, is conducted based on the methods of institutional-economic, interdisciplinary, empirical generalization, interpretation of new economic institutions and concepts, hypothesizing and scientific approach to the analysis of a new digital socio-economic reality. The research results are, firstly, a confirmed relationship between digital trust and digital economic security; second, digital trust and artificial intelligence; third, digital distrust and institutional traps in the context of artificial intelligence; fourth, the institutional aspects of AI on the example of China. The authorial hypothesis is formulated as the following: are destructive institutions and institutional-economic thinking formed in the context of the economy and society digitalization, the development of a Russian digital economy model with conflicting institutions? The novelty of the study involves clarifying the definitions of the institution of trust, digital global distrust, as well as digital institutional traps, the level of digital trust (for business, the abovementioned is reflected in building a trust system in supply chains, measured in terms of user confidence in information and digital goods, in the protection of personal data, their confidentiality).
Styles APA, Harvard, Vancouver, ISO, etc.
21

Levy, E. « Poisoning the software supply chain ». IEEE Security & ; Privacy 1, no 3 (mai 2003) : 70–73. http://dx.doi.org/10.1109/msecp.2003.1203227.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Ball, Michael O., Meng Ma, Louiqa Raschid et Zhengying Zhao. « Supply chain infrastructures ». ACM SIGMOD Record 31, no 1 (mars 2002) : 61–66. http://dx.doi.org/10.1145/507338.507350.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Al-Farsi, Sana, Halima Bensmail et Spiridon Bakiras. « Securing Blockchain-Based Supply Chain Workflow against Internal and External Attacks ». Machines 10, no 6 (31 mai 2022) : 431. http://dx.doi.org/10.3390/machines10060431.

Texte intégral
Résumé :
Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. The primary goal of using a blockchain for supply chain management is to reduce the overall production cost while providing comprehensive security to the system. However, current blockchain-based supply-chain workflow(s) (BSW) are still susceptible to various cyber threats due to evolving business processes of different stakeholders involved in the process. In fact, current BSW protects the supply chain process based on the rules that have been implemented in the corresponding smart contracts. However, in practice, the requirements for the process keep evolving due to several organizational policies and directives of the involved stakeholders; therefore, current blockchain-based solutions fail to protect the supply chain process against attacks that exploit the process-related information that is not protected by smart contracts. Therefore, the goal of this work was to develop a methodology that enhances the protection of BSW against various internal (e.g., Stuxnet) and external (e.g., local data breach of a stakeholder) cyber threats through monitoring the stakeholder business process. Our methodology complements the blockchain-based solution because it protects the stakeholder’s local process against the attacks that exploit the process information that is not protected in the smart contracts. We implemented a prototype and demonstrated its application to a typical supply chain workflow example application by successfully detecting internal and external attacks to the application.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Mukhsin, Moh, HER Taufik, Asep Ridwan et Tulus Suryanto. « The mediation role of supply chain agility on supply chain orientation-supply chain performance link ». Uncertain Supply Chain Management 10, no 1 (2022) : 197–204. http://dx.doi.org/10.5267/j.uscm.2021.9.008.

Texte intégral
Résumé :
This study aims to analyze the supply chain performance mediation on the relationship between supplier flexibility, supply agility, and company performance. The population in this study were 100 broilers in the districts / cities in Banten Province. The data to be used in this study are primary data, through sending questionnaires. Development of theoretical models with five hypotheses processed in the analysis using SmartPLS Software version 3.0.m3. The results showed that supplier flexibility and supply agility have a positive and significant effect on company performance, supplier flexibility and supply agility have a positive and significant effect on supply chain performance and supply chain performance has a positive and significant effect as an intervening variable to the company performance. Supply chain mediation has an important role in integrating production processes from upstream to downstream, including establishing good relations between businesses involved in supply chain management to improve the company's performance.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Warren, Matthew, et William Hutchinson. « Cyber attacks against supply chain management systems : a short note ». International Journal of Physical Distribution & ; Logistics Management 30, no 7/8 (septembre 2000) : 710–16. http://dx.doi.org/10.1108/09600030010346521.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Wang, Ge, Shouqian Shi, Minmei Wang, Chen Qian, Cong Zhao, Han Ding, Wei Xi et Jizhong Zhao. « RF-Chain ». Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no 4 (21 décembre 2022) : 1–28. http://dx.doi.org/10.1145/3569493.

Texte intégral
Résumé :
Blockchain-based supply chains provide a new solution to decentralized multi-party product management. However, existing methods, including ID-based and cryptographic-based solutions, cannot achieve both counterfeit resistance and decentralization in supply chain management. We argue that this dilemma comes from the disconnection and inconsistency of the data records and physical product entities. This paper proposes RF-Chain, a novel decentralized supply chain management solution that uniquely combines data record authentication and physical-layer RFID tag authentication to effectively achieve credibility and counterfeit resistance. The main contribution of this work is to integrate physical-layer authentication of cheap commodity RFID tags into a blockchain-based information management system, and RF-Chain is the first to do so. The proposed cross-layer authentication can effectively defend against counterfeit attacks without relying on a central key management service. Real-world experiments utilizing the Ethereum (ETH) platform and more than 100 RFID tags demonstrate that RF-Chain is secure, effective, time-efficient, and cost-efficient.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Kshetri, Nir, et Jeffrey Voas. « Supply Chain Trust ». IT Professional 21, no 2 (1 mars 2019) : 6–10. http://dx.doi.org/10.1109/mitp.2019.2895423.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Karmanov, V. S., B. S. Solov’ev et V. Yu Shсhekoldin. « SOFTWARE DEVELOPMENT FOR SUPPLY CHAIN INTERACTION MODELING ». Vestnik komp'iuternykh i informatsionnykh tekhnologii, no 186 (décembre 2019) : 18–26. http://dx.doi.org/10.14489/vkit.2019.12.pp.018-026.

Texte intégral
Résumé :
The study of complex logistic systems often requires specialized software that allows studying the characteristics and properties of the observed object using simulation methods. An example of such a system is the supply network, in the general case of an arbitrary structure. For linear supply chains known business game “Beer Game”, which allows to observe and explore the effects that occur in long supply chains. The aim of the work was to develop a model that is a generalization of the original “Beer Game” in the case of a supply network of arbitrary topology and the development of software that allows investigating the resulting model using simulation methods. In this paper the mathematical model of the supply chain is presented. A set of algorithms for estimating and forming the order volume by each network participant is proposed. The developed application that emulates the work of the supply chain is described. Various ways of creating a supply network topology have been proposed, and a description of the parameters for modeling the supply network has been given. The capabilities of the application are demonstrated when generating data and interpreting the obtained results in the form of tables, graphs, and animation. The ways of forming supply chains with different characteristics are studied. Experiments on the study of algorithms for estimating the volume of orders on various topologies of supply chains were carried out. Ways to assess the performance of the supply chain were proposed. The developed software can be used to justify the choice of strategy for managing supply chains in distribution logistics for industrial and commercial enterprises of various sizes, from large networks to retail. In addition, the developed software can be used in the educational process for students of economic specialties.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Wirth, Axel. « Cyberinsights : Talking about the Software Supply Chain ». Biomedical Instrumentation & ; Technology 54, no 5 (1 septembre 2020) : 364–67. http://dx.doi.org/10.2345/0899-8205-54.5.364.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Verwijmeren, Martin. « Software component architecture in supply chain management ». Computers in Industry 53, no 2 (février 2004) : 165–78. http://dx.doi.org/10.1016/j.compind.2003.07.004.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Fajar, Ahmad Nurul, Ditdit Nugeraha Utama et Gunawan Wang. « Intelligent Software Product Line For Supply Chain ». Journal of Physics : Conference Series 1090 (septembre 2018) : 012043. http://dx.doi.org/10.1088/1742-6596/1090/1/012043.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Favilla, Jose, et Andrew Fearne. « Supply chain software implementations : getting it right ». Supply Chain Management : An International Journal 10, no 4 (1 septembre 2005) : 241–43. http://dx.doi.org/10.1108/13598540510612695.

Texte intégral
Résumé :
PurposeTo highlight key success factors in supply chain projects.Design/methodology/approachThe paper presents insights from a number of supply chain projects in which IT has played an important part in the business solution.FindingsSuccessful supply chain projects have four things in common: the right leadership, the right focus, the right approach and effective communication of KPIs to all stakeholders engaged in the project.Research limitations/implicationsThe focus of the paper is on supply chain projects with a significant IT component, but the key success factors identified are common to the majority of supply chain projects.Practical implicationsCompanies must not assume that investment in IT is, by itself, a solution to their supply chain solutions. A lack of leadership, focus and communication will invariably result in sub‐optimal outcomes which are all too frequently attributed to the complex nature of the project or the inflexibility of the software when in most cases the problems are internal to the businesses involved and the project management process.Originality/valueThis paper provides practical tips for improving the likelihood of getting the most out of IT‐based supply chain projects.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Aslam, Haris, Abdul Qadeer Khan, Kamran Rashid et Saif-ur Rehman. « Achieving supply chain resilience : the role of supply chain ambidexterity and supply chain agility ». Journal of Manufacturing Technology Management 31, no 6 (24 avril 2020) : 1185–204. http://dx.doi.org/10.1108/jmtm-07-2019-0263.

Texte intégral
Résumé :
PurposeThis study analyzes the role of supply chain ambidexterity (SC-Ambidexterity) in developing supply chain resilience (SC-Resilience). We describe SC-Ambidexterity as a simultaneous application of supply chain adaptability (SC-Adaptability) and supply chain alignment (SC-Alignment) capabilities. We also consider the role of supply chain agility (SC-Agility) in the relationship between SC-Ambidexterity and SC-Resilience. We further suggest that the relationship between SC-Ambidexterity and SC-Resilience may be stronger in case of higher market uncertainty.Design/methodology/approachBased on the dynamic capabilities view (DCV) of the firm, we develop a set of hypotheses that are tested through a survey of manufacturing firms in Pakistan. The hypothesized model is tested through structural equation modeling (SEM).FindingsThe results of this study show a positive effect of SC-Ambidexterity on SC-Resilience. SC-Agility positively mediates the relationship between SC-Ambidexterity and SC-Resilience. However, our results show that this relationship does not vary at different levels of environmental uncertainty.Originality/valueThis study provides the seminal operationalization of SC-Ambidexterity in the supply chain context. It further shows the importance of SC-Ambidexterity and SC-Agility in contributing toward SC-Resilience.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Yeboah-Ofori, Abel, et Shareeful Islam. « Cyber Security Threat Modeling for Supply Chain Organizational Environments ». Future Internet 11, no 3 (5 mars 2019) : 63. http://dx.doi.org/10.3390/fi11030063.

Texte intégral
Résumé :
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.
Styles APA, Harvard, Vancouver, ISO, etc.
35

EL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan et Jong Hyuk Park. « Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems ». Sensors 22, no 4 (10 février 2022) : 1371. http://dx.doi.org/10.3390/s22041371.

Texte intégral
Résumé :
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain. In recent years, multiple cyber-attacks have targeted medical supply chain communication networks due to their lack of security measures. In the era where cyber-attacks are cheaper and easier due to the computational power and various algorithms available for malicious uses, security, and data privacy requires intensive and higher measures. On the other hand, Information Hiding Techniques (IHT) compromise various advanced methods to hide sensitive information from being disclosed to malicious nodes. Moreover, with the support of Blockchain, IHT can bring higher security and the required privacy levels. In this paper, we propose the implementation of Blockchain and smart contract with the information hiding technique to enhance the security and privacy of data communication in critical systems, such as smart healthcare supply chain communication networks. Results show the feasibility of the framework using Hyperledger smart contract along with the desired security level.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 76, no 1 (janvier 2001) : 48. http://dx.doi.org/10.1177/003754970107600107.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 76, no 2 (février 2001) : 121. http://dx.doi.org/10.1177/003754970107600216.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 76, no 3 (mars 2001) : 186. http://dx.doi.org/10.1177/003754970107600308.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 76, no 4 (avril 2001) : 241. http://dx.doi.org/10.1177/003754970107600410.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 76, no 5 (mai 2001) : 307. http://dx.doi.org/10.1177/003754970107600518.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Bruzzone, Agostino G. « Supply Chain Simulation ». SIMULATION 77, no 3-4 (septembre 2001) : 155. http://dx.doi.org/10.1177/003754970107700309.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Davidson, Rebecca K., Wilson Antunes, Elisabeth H. Madslien, José Belenguer, Marco Gerevini, Tomas Torroba Perez et Raffaello Prugger. « From food defence to food supply chain integrity ». British Food Journal 119, no 1 (3 janvier 2017) : 52–66. http://dx.doi.org/10.1108/bfj-04-2016-0138.

Texte intégral
Résumé :
Purpose Consumer confidence in the European food industry has been shaken by a number of recent scandals due to food fraud and accidental contamination, reminding the authors that deliberate incidents can occur. Food defence methods aim to prevent or mitigate deliberate attacks on the food supply chain but are not a legal requirement. The purpose of this paper is to discuss how proactive and reactive food defence practices can help prevent or mitigate malicious attacks on the food chain and also food fraud, food crime and food safety. The authors look at how food defence differs from food safety and how it contributes to food supply chain integrity. Design/methodology/approach Food defence has been the focus of two different EU FP7 security projects, EDEN and SNIFFER. Food industry stakeholders participated in workshops and demonstrations on food defence and relevant technology was tested in different food production scenarios. Findings Food industry end-users reported a lack of knowledge regarding food defence practices. They wished for further guidelines and training on risk assessment as well as access to validated test methods. Novel detection tools and methods showed promise with authentication, identification, measurement, assessment and control at multiple levels of the food supply chain prior to distribution and retail. Practical implications The prevention of a contamination incident, prior to retail, costs less than dealing with a large foodborne disease outbreak. Food defence should therefore be integral to food supply chain integrity and not just an afterthought in the wake of an incident. Originality/value It is argued that food defence practices have a vital role to play across the board in unintentional and intentional food contamination incidents. The application of these methods can help ensure food supply chain integrity.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Gorane, S. J., et Ravi Kant. « Supply chain practices ». Benchmarking : An International Journal 23, no 5 (4 juillet 2016) : 1076–110. http://dx.doi.org/10.1108/bij-06-2014-0059.

Texte intégral
Résumé :
Purpose – The purpose of this paper is to investigate the current level of supply chain practices (SCPs) in Indian manufacturing organizations. Design/methodology/approach – The 15 SCPs are identified based on the literature support and opinion of industry experts and academia, and data were collected from 292 organizations. Data were analyzed using the statistical package for the social science software to see the current level/penetration of SCPs in Indian manufacturing organizations. Findings – The practices, namely, organizational culture, customer relationship, information and communication technology, benchmarking and performance measurement, lean manufacturing, agile manufacturing, supplier relationship are highly penetrated practices in Indian manufacturing organizations. The practices, namely, outsourcing, information sharing, just in time manufacturing, green supply chain management are moderately penetrated practices, while the practices, namely, reverse logistics, postponement, vendor managed inventory, radio frequency are least penetrated practices in Indian manufacturing organizations. Research limitations/implications – Further study can be extended to see the of penetration practices applicable to service and agriculture sectors. Practical implications – The result of this paper will enable the organizations to identify and direct their focus on the areas that requires improvement. Also, the organizations will become more aware of the SCPs that will help in boosting up their performance and competitiveness and indirectly boost the growth and contribute to India’s economic development. Originality/value – This is the first kind of study which checked the level of selected SCPs in Indian manufacturing organizations.
Styles APA, Harvard, Vancouver, ISO, etc.
44

McGregor, John D. « The Weak Link in the Supply Chain. » Journal of Object Technology 3, no 8 (2004) : 71. http://dx.doi.org/10.5381/jot.2004.3.8.c7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
45

Prestifilippo, Giovanni. « Resilienz für die Supply Chain ». Logistik für Unternehmen 35, no 09-10 (2021) : 39–41. http://dx.doi.org/10.37544/0930-7834-2021-09-10-39.

Texte intégral
Résumé :
Software-Systeme für intelligentes Supply Chain Network Design bieten optimale Risikovorsorge für die Stabilität der Supply Chain. Bereits im Vorfeld lassen sich mit ihnen für eine Vielzahl potenzieller Risiken funktionierende Alternativen zu den etablierten Distributions- und Versorgungsketten planen und vorhalten, um Reaktionszeiten und Einbußen zu minimieren.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Cao, Cheng Xuan, Chong Ling Ren, Wen Wen Shi et Jing Li. « A Study on Supply Chain Management of Software-Focused Products ». Applied Mechanics and Materials 66-68 (juillet 2011) : 995–1000. http://dx.doi.org/10.4028/www.scientific.net/amm.66-68.995.

Texte intégral
Résumé :
In this paper, we introduce the concept of the software-focused chain. A software focused product consists of hardware component and software component, where the software component is either the higher value part of the product. We study a software-focused product and service supply chain based on the case study of Beijing UniStrong Company. We discuss the common and unique issues that a software-focused supply chain has compared with a traditional supply chain. Issues and challenges of the software-focused supply chain management have also been studied in the paper.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Tarigan, Zeplin Jiwa Husada, Hotlan Siagian et Ferry Jie. « Impact of Internal Integration, Supply Chain Partnership, Supply Chain Agility, and Supply Chain Resilience on Sustainable Advantage ». Sustainability 13, no 10 (13 mai 2021) : 5460. http://dx.doi.org/10.3390/su13105460.

Texte intégral
Résumé :
The global order has suddenly changed due to the COVID-19 pandemic. Many countries, including Indonesia, have applied lockdown policies to stop the spread of COVID-19. Lockdown policies have disrupted the supply of raw materials and the demand for finished goods. The manufacturing industry is one of the sectors that has suffered most in this situation, and they have struggled to reconfigure their internal and external supply chain network and partnership. This study examined the impact of internal integration, supply chain partnership, supply chain agility, and supply chain resilience on sustainable advantage. The participants of this study were from manufacturing companies in Indonesia. For data collection, a questionnaire was used, with a five-point Likert scale to obtain the respondents’ opinions. Using Google Form link, the questionnaire was distributed via email and the WhatsApp social media application to the predetermined set of manufacturing companies. Respondents filled out 672 questionnaires, and 456 respondents (corresponding to 67.86%) filled it out correctly and were considered valid for further analysis. Partial least squares (PLS) regression was used to analyze the data using the SmartPLS software version 3.3. The results supported all nine hypotheses proposed. Internal integration through interdepartmental data sharing affects supply chain (SC) partnerships, SC agility, and SC resilience. Moreover, SC partnerships, through the on-time delivery of materials and by coping with changing demand, improve SC agility, SC resilience, and sustainable advantages. SC agility, in keeping the production process running normally and regulating the production capacity, affects SC resilience and sustainable advantage. SC resilience improves sustainable advantage by providing timely product delivery and reliable sales volumes in pandemic conditions. These results provide insights for managers into enhancing the sustainable advantage by improving supply chain agility, supply chain resilience, and supply chain partnerships. This study could contribute and extend the acceptance of previous studies in the context of the manufacturing industry.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Soto-Valero, Cesar, Martin Monperrus et Benoit Baudry. « The Multibillion Dollar Software Supply Chain of Ethereum ». Computer 55, no 10 (octobre 2022) : 26–34. http://dx.doi.org/10.1109/mc.2022.3175542.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Sebastian, Kot, et Ślusarczyk Beata. « "Process Simulation In Supply Chain Using Logware Software " ». Annales Universitatis Apulensis Series Oeconomica 2, no 11 (31 décembre 2009) : 932–37. http://dx.doi.org/10.29302/oeconomica.2009.11.2.37.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Tucci, Christopher L., Allen Kaufman, Craig H. Wood et Gregory Theyel. « Collaboration and Teaming in the Software Supply Chain ». Supply Chain Forum : An International Journal 6, no 2 (janvier 2005) : 16–28. http://dx.doi.org/10.1080/16258312.2005.11517144.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie