Добірка наукової літератури з теми "Software Supply Chain Attacks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software Supply Chain Attacks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software Supply Chain Attacks"
Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.
Повний текст джерелаКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Повний текст джерелаWatney, Murdoch. "Cybersecurity Threats to and Cyberattacks on Critical Infrastructure: a Legal Perspective." European Conference on Cyber Warfare and Security 21, no. 1 (June 8, 2022): 319–27. http://dx.doi.org/10.34190/eccws.21.1.196.
Повний текст джерелаKaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Повний текст джерелаChetthamrongchai, Paitoon, Johnry Dayupay, Sevdie Alshiqi, Tawfeeq Abdulameer Hashim Alghazali, A. Heri Iswanto, Luigi Pio Leonardo Cavaliere, Ahmed Kateb Jumaah Al-Nussairi, Karrar Hatif Mohmmed, and Mustafa M. Kadhim. "Design a Mathematical Planning Approach to Optimize the Supply Chain Taking Into Account Uncertainties In Distributors." Foundations of Computing and Decision Sciences 47, no. 4 (December 1, 2022): 409–20. http://dx.doi.org/10.2478/fcds-2022-0022.
Повний текст джерелаZhou, Chencheng, Liudong Xing, Qisi Liu, and Honggang Wang. "Semi-Markov Based Dependability Modeling of Bitcoin Nodes Under Eclipse Attacks and State-Dependent Mitigation." International Journal of Mathematical, Engineering and Management Sciences 6, no. 2 (April 1, 2021): 480–92. http://dx.doi.org/10.33889/ijmems.2021.6.2.029.
Повний текст джерелаTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Повний текст джерелаJohnson, Chris, and Maria Evangelopoulou. "Defending Against Firmware Cyber Attacks on Safety-Critical Systems." Journal of System Safety 54, no. 1 (April 1, 2018): 16–21. http://dx.doi.org/10.56094/jss.v54i1.83.
Повний текст джерелаLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Повний текст джерелаShinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.
Повний текст джерелаДисертації з теми "Software Supply Chain Attacks"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Повний текст джерелаRueda, Guerrero María Ximena. "Robustness of complex supply chain networks to targeted attacks." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119719.
Повний текст джерелаThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 65-67).
In this thesis, we study the robustness of complex supply chain systems from a network science perspective. Through the simulation of targeted attacks to nodes and edges using different hierarchical measures from network science to select the most relevant components, we evaluate the extent to which local centrality measures can estimate the relevance of a node in maintaining the connectivity and the efficient communication across the network. We perform the experiments on two real-world supply chain data sets, and on an ensemble of networks generated from network growth models that share simple topological properties with the real-world networks. It is found that all models produce more robust networks than the data sets of choice. In addition, the removal of high average neighbor degree nodes seems to have little impact on the connectivity of the network, and a highly varying impact on the efficiency of the network. Finally, robustness against targeted node and edge removal is found to be more associated to the number of nodes and links in the network than to more complex network measures such as the degree distribution.
by María Ximena Rueda Guerrero.
M. Eng.
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Повний текст джерелаIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Sheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Повний текст джерелаIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Tan, Chow Yin 1973. "Supply-chain software systems : current issues and imperatives in selection and implementation." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9932.
Повний текст джерелаRouse, Vicki Henderson. "An Internship with Choice Systems, Inc., A Supply Chain Solution Software Company." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146622914.
Повний текст джерелаArunachalam, Raghu. "An agent based compositional framework for supply chain simulation." Thesis, University of Warwick, 2000. http://wrap.warwick.ac.uk/36393/.
Повний текст джерелаBredenkamp, Frederick van Biljon. "The development of a generic just-in-time supply chain optimisation software tool /." Link to the online version, 2005. http://hdl.handle.net/10019/980.
Повний текст джерелаBredenkamp, F. v. B. "The development of a generic just-in-time supply chain optimisation software tool." Thesis, Stellenbosch : University of Stellenbosch, 2005. http://hdl.handle.net/10019.1/1920.
Повний текст джерелаPippow, Ingo. "Software-Agenten in Distributionsnetzen : Potenziale vertikaler Informationsteilung zur Senkung von Transaktionskosten /." Wiesbaden : Dt. Univ.-Verl, 2004. http://www.gbv.de/dms/zbw/388109858.pdf.
Повний текст джерелаКниги з теми "Software Supply Chain Attacks"
Enterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Знайти повний текст джерелаStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000.
Знайти повний текст джерелаHartmut, Stadtler, and Kilger Christoph 1965-, eds. Supply chain management and advanced planning: Concepts, models, software, and case studies. 2nd ed. Berlin ; New York: Springer, 2002.
Знайти повний текст джерелаStadtler, Hartmut. Supply Chain Management and Advanced Planning: Concepts, Models, Software and Case Studies. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002.
Знайти повний текст джерелаValverde, Raul. Information systems reengineering for modern business systems: ERP, supply chain and e-commerce management solutions. Hershey, PA: Information Science Reference, 2012.
Знайти повний текст джерелаKang, Shu Gang. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control: Method, Software and Industrial Application. London: Springer London, 2013.
Знайти повний текст джерелаLuo, Zongwei. Mechanism Design for Sustainability: Techniques and Cases. Dordrecht: Springer Netherlands, 2013.
Знайти повний текст джерелаKovalenko, Vladimir. Design of information systems. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/987869.
Повний текст джерелаSupply Chain Forecasting Software. SCM Focus Press, 2012.
Знайти повний текст джерелаDisclosure of Software Supply Chain Risks. RAND Corporation, 2022. http://dx.doi.org/10.7249/pea2072-1.
Повний текст джерелаЧастини книг з теми "Software Supply Chain Attacks"
Ohm, Marc, Henrik Plate, Arnold Sykosch, and Michael Meier. "Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment, 23–43. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_2.
Повний текст джерелаQuante, Rainer, Herbert Meyr, and Moritz Fleischmann. "Revenue management and demand fulfillment: matching applications, models and software." In Supply Chain Planning, 57–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-93775-3_3.
Повний текст джерелаGuillén-Gosálbez, Gonzalo, and Fengqi You. "Plant Location: Supply Chain Management." In Introduction to Software for Chemical Engineers, 669–80. Second edition. | Boca Raton, FL: CRC Press/Taylor & Francis: CRC Press, 2019. http://dx.doi.org/10.1201/9780429451010-16.
Повний текст джерелаBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO." In Integriertes Supply Chain Management, 235–59. Wiesbaden: Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-663-10380-6_12.
Повний текст джерелаBick, Michael. "Einführungskonzept für Supply Chain Management Software am Beispiel von SAP APO." In Integriertes Supply Chain Management, 259–83. Wiesbaden: Gabler Verlag, 2004. http://dx.doi.org/10.1007/978-3-663-10381-3_13.
Повний текст джерелаMüller, Jörg P., Bernhard Bauer, Thomas Friese, Stephan Roser, and Roland Zimmermann. "Software Agents for Electronic Business: Opportunities and Challenges (2005 Re-mix)." In Multiagent based Supply Chain Management, 63–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-33876-5_3.
Повний текст джерелаHanne, Thomas, and Rolf Dornberger. "Intelligent Software for Logistics." In Computational Intelligence in Logistics and Supply Chain Management, 153–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40722-7_7.
Повний текст джерелаHanne, Thomas, and Rolf Dornberger. "Intelligente Software für die Logistik." In Computational Intelligence in Logistik und Supply Chain Management, 163–80. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-21452-3_7.
Повний текст джерелаKortus-Schultes, Doris, and Ute Ferfer. "Beschleunigungsfaktoren im Management von Supply Chains: Software-Werkzeuge." In Logistik und Marketing in der Supply Chain, 77–79. Wiesbaden: Gabler Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-82301-4_8.
Повний текст джерелаEspinoza-Mejía, Mauricio, Víctor Saquicela, and Victoria Abril-Ulloa. "Ensuring Traceability and Orchestration in the Food Supply Chain." In Artificial Intelligence, Computer and Software Engineering Advances, 135–49. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68080-0_10.
Повний текст джерелаТези доповідей конференцій з теми "Software Supply Chain Attacks"
Hossain Faruk, Md Jobair, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, and Fan Wu. "Investigating Novel Approaches to Defend Software Supply Chain Attacks." In 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2022. http://dx.doi.org/10.1109/issrew55968.2022.00081.
Повний текст джерелаWang, Xinyuan. "On the Feasibility of Detecting Software Supply Chain Attacks." In MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). IEEE, 2021. http://dx.doi.org/10.1109/milcom52596.2021.9652901.
Повний текст джерелаOhm, Marc, Arnold Sykosch, and Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Повний текст джерелаVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate, and Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Повний текст джерелаCoram, Michael. "Anatomy of a Software Supply Chain Attack." In Proposed for presentation at the NLIT Summit 2020 held October 13-16, 2020 in virtual, virtual, virtual. US DOE, 2020. http://dx.doi.org/10.2172/1825030.
Повний текст джерелаMasum, Mohammad, Mohammad Nazim, Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, et al. "Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?" In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00097.
Повний текст джерелаYan, Dapeng, Yuqing Niu, Kui Liu, Zhe Liu, Zhiming Liu, and Tegawende F. Bissyande. "Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain." In 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2021. http://dx.doi.org/10.1109/qrs54544.2021.00060.
Повний текст джерелаCoufalikova, Aneta, Ivo Klaban, and Tomas Slajs. "Complex strategy against supply chain attacks." In 2021 International Conference on Military Technologies (ICMT). IEEE, 2021. http://dx.doi.org/10.1109/icmt52455.2021.9502768.
Повний текст джерелаSingi, Kapil, Jagadeesh Chandra Bose R P, Sanjay Podder, and Adam P. Burden. "Trusted Software Supply Chain." In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2019. http://dx.doi.org/10.1109/ase.2019.00141.
Повний текст джерелаLudvigsen, Kaspar Rosager, Shishir Nagaraja, and Angela Daly. "Preventing or Mitigating Adversarial Supply Chain Attacks." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564552.
Повний текст джерелаЗвіти організацій з теми "Software Supply Chain Attacks"
Visker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada378230.
Повний текст джерелаChu, Tsong-Lun, Athi Varuttamaseni, Joo-Seok Baek, and Susan Pepper. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), November 2016. http://dx.doi.org/10.2172/1329799.
Повний текст джерелаChandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Повний текст джерелаLindquist, Joachim, and Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Повний текст джерелаLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.
Повний текст джерелаHicks, Julie, Laurin Yates, and Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41867.
Повний текст джерелаCoyner, Kelley, and Jason Bittner. Automated Vehicles and Infrastructure Enablers. SAE International, March 2022. http://dx.doi.org/10.4271/epr2022008.
Повний текст джерела