Journal articles on the topic 'Chain of Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Chain of Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
de Goede, Marieke. "The chain of security." Review of International Studies 44, no. 1 (2017): 24–42. http://dx.doi.org/10.1017/s0260210517000353.
Full textWilliams, Zachary, Jason E. Lueg, Sean P. Goffnett, Stephen A. LeMay, and Robert L. Cook. "Understanding supply chain security strategy." Journal of Transportation Management 23, no. 1 (2012): 7–25. http://dx.doi.org/10.22237/jotm/1333238520.
Full textPN, Sindhuja. "Impact of information security initiatives on supply chain performance." Information Management & Computer Security 22, no. 5 (2014): 450–73. http://dx.doi.org/10.1108/imcs-05-2013-0035.
Full textWalker, Simon. "Security in the value chain." Computer Fraud & Security 2011, no. 7 (2011): 16–18. http://dx.doi.org/10.1016/s1361-3723(11)70074-4.
Full textViega, John, and James Bret Michael. "Struggling With Supply-Chain Security." Computer 54, no. 7 (2021): 98–104. http://dx.doi.org/10.1109/mc.2021.3075412.
Full textShafiu, Ibrahim, William Yu Chung Wang, and Harminder Singh. "Information Security Compliance Behaviour of Supply Chain Stakeholders." International Journal of Information Systems and Supply Chain Management 9, no. 1 (2016): 1–16. http://dx.doi.org/10.4018/ijisscm.2016010101.
Full textZhu, Sheng, Cheng Zhou, and Cheng Wang. "Security Service Function Chain based on Software-Defined Security." Journal of Physics: Conference Series 2010, no. 1 (2021): 012083. http://dx.doi.org/10.1088/1742-6596/2010/1/012083.
Full textP.N., Sindhuja. "The impact of information security initiatives on supply chain robustness and performance: an empirical study." Information & Computer Security 29, no. 2 (2021): 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.
Full textVéronneau, Simon, and Jacques Roy. "Security at the source: securing today’s critical supply chain networks." Journal of Transportation Security 7, no. 4 (2014): 359–71. http://dx.doi.org/10.1007/s12198-014-0149-z.
Full textBruzzone, Agostino G., Francesco Longo, Marina Massei, Letizia Nicoletti, and Matteo Agresta. "Safety and Security in Fresh Good Supply Chain." International Journal of Food Engineering 10, no. 4 (2014): 545–56. http://dx.doi.org/10.1515/ijfe-2014-0020.
Full textKenny, Steven. "Strengthening the network security supply chain." Computer Fraud & Security 2017, no. 12 (2017): 11–14. http://dx.doi.org/10.1016/s1361-3723(17)30108-2.
Full textHintsa, Juha, Ximena Gutierrez, Philip Wieser, and Ari Pekka Hameri. "Supply Chain Security Management: an overview." International Journal of Logistics Systems and Management 5, no. 3/4 (2009): 344. http://dx.doi.org/10.1504/ijlsm.2009.022501.
Full textUrciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29 (2013): 51–68. http://dx.doi.org/10.11610/isij.2904.
Full textCards, Smart. "Block chain security in smart cards." JIMS8M: The Journal of Indian Management & Strategy 24, no. 1 (2019): 63. http://dx.doi.org/10.5958/0973-9343.2019.00009.7.
Full textYang, Kun, Haoting Shen, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. "Hardware-Enabled Pharmaceutical Supply Chain Security." ACM Transactions on Design Automation of Electronic Systems 23, no. 2 (2018): 1–26. http://dx.doi.org/10.1145/3144532.
Full textGracia, Marco A. Lara, and Shimon Y. Nof. "Conflict resolution in supply chain security." International Journal of Value Chain Management 3, no. 2 (2009): 168. http://dx.doi.org/10.1504/ijvcm.2009.026956.
Full textVidhate, Amarsinh V., Chitra Ramesh Saraf, Mrunal Anil Wani, Sweta Siddarth Waghmare, and Teresa Edgar. "Applying Blockchain Security for Agricultural Supply Chain Management." International Journal of Applied Evolutionary Computation 11, no. 4 (2020): 28–37. http://dx.doi.org/10.4018/ijaec.2020100103.
Full textUrciuoli, Luca, Sangeeta Mohanty, Juha Hintsa, and Else Gerine Boekesteijn. "The resilience of energy supply chains: a multiple case study approach on oil and gas supply chains to Europe." Supply Chain Management: An International Journal 19, no. 1 (2014): 46–63. http://dx.doi.org/10.1108/scm-09-2012-0307.
Full textSomani, Vikas, and Dr Munesh Chandra Trivedi. "A Review on Block Chain in Cloud Computing Healthcare Data Security." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11 (2019): 55–59. http://dx.doi.org/10.5373/jardcs/v11i11/20193168.
Full textUrciuoli, Luca, and Juha Hintsa. "Differences in security risk perceptions between logistics companies and cargo owners." International Journal of Logistics Management 27, no. 2 (2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.
Full textIrani, Zahir, and Amir M. Sharif. "Sustainable food security futures." Journal of Enterprise Information Management 29, no. 2 (2016): 171–78. http://dx.doi.org/10.1108/jeim-12-2015-0117.
Full textGhadge, Abhijeet, Maximilian Weiß, Nigel D. Caldwell, and Richard Wilding. "Managing cyber risk in supply chains: a review and research agenda." Supply Chain Management: An International Journal 25, no. 2 (2019): 223–40. http://dx.doi.org/10.1108/scm-10-2018-0357.
Full textVenter, Hein S. "Security issues in the security cyber supply chain in South Africa." Technovation 34, no. 7 (2014): 392–93. http://dx.doi.org/10.1016/j.technovation.2014.02.005.
Full textLiu, Yi, Hong-qi Zhang, Jiang Liu, and Ying-jie Yang. "A New Approach for Delivering Customized Security Everywhere: Security Service Chain." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/9534754.
Full textSobb, Theresa, Benjamin Turnbull, and Nour Moustafa. "Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions." Electronics 9, no. 11 (2020): 1864. http://dx.doi.org/10.3390/electronics9111864.
Full text박홍규 and 정재완. "A Conceptual Study on Supply Chain Security." KOREA INTERNATIONAL COMMERCIAL REVIEW 28, no. 2 (2013): 221–41. http://dx.doi.org/10.18104/kaic.28.2.201306.221.
Full textBalasubramaniam, Yamunaa, and Sathyanarayanan PSV. "Enhancing Connected Vehicle Security with Block chain." International Journal of Advances in Scientific Research and Engineering 4, no. 8 (2018): 189–93. http://dx.doi.org/10.31695/ijasre.2018.32849.
Full textHaq, Shahid Ul, and Yashwant Singh. "On IoT Security ModelsTraditional and Block chain." International Journal of Computer Sciences and Engineering 06, no. 03 (2018): 26–31. http://dx.doi.org/10.26438/ijcse/v6si3.2631.
Full textUlhaq, Irfan, Kevin Titus Kuruvilla, Mathews Nkhoma, Hanh Hong Vu, and Ngan Truong Tuyet. "INFORMATION SECURITY RISKS IN SUPPLY CHAIN MANAGEMENT:." International Journal of Information Systems and Engineering 4, no. 2 (2016): 58–68. http://dx.doi.org/10.24924/ijise/2016.11/v4.iss2/58.68.
Full textAli, Sk Subidh, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty. "Supply-Chain Security of Digital Microfluidic Biochips." Computer 49, no. 8 (2016): 36–43. http://dx.doi.org/10.1109/mc.2016.224.
Full textSokolov, Alexander, Vladimir Mesropyan, and Alexander Chulok. "Supply chain cyber security: A Russian outlook." Technovation 34, no. 7 (2014): 389–91. http://dx.doi.org/10.1016/j.technovation.2014.01.004.
Full textFinne, Thomas. "The information security chain in a company." Computers & Security 15, no. 4 (1996): 297–316. http://dx.doi.org/10.1016/0167-4048(96)88941-3.
Full textBalick, Rachel. "DIR reform, supply chain security, and more." Pharmacy Today 27, no. 7 (2021): 65–66. http://dx.doi.org/10.1016/j.ptdy.2021.06.025.
Full textStaniewska, Ewa. "Selected aspects of supply chain security management." Systemy Logistyczne Wojsk 54, no. 1 (2021): 135–48. http://dx.doi.org/10.37055/slw/140379.
Full textAllouch, Azza, Omar Cheikhrouhou, Anis Koubâa, Khalifa Toumi, Mohamed Khalgui, and Tuan Nguyen Gia. "UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones." Sensors 21, no. 9 (2021): 3049. http://dx.doi.org/10.3390/s21093049.
Full textWang, Yao, and Jing Lu. "China's Oil Imports Supply Chain Safety Evaluation." Advanced Materials Research 1030-1032 (September 2014): 2538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.2538.
Full textIvanova, М., V. Smiesova, A. Tkachenko, M. Boichenko, and T. Arkhypenko. "EFFICIENCY OF THE LOGISTICS CHAIN AS A FACTOR OF ECONOMIC SECURITY OF ENTERPRISES." Financial and credit activity: problems of theory and practice 2, no. 37 (2021): 151–60. http://dx.doi.org/10.18371/fcaptp.v2i37.229950.
Full textKafeero, Edward. "Profiting from the Authorized Economic Operator Paradigm in the Era of Global Value Chains: A Conceptual and Legal Analysis." International Conference on Advances in Business, Management and Law (ICABML) 2017 1, no. 1 (2017): 467–76. http://dx.doi.org/10.30585/icabml-cp.v1i1.38.
Full textRajasekhar, K., N. Raga Rohith, G. N V Krishna Mohan, D. Divya, and Ch Jaya Bharathi. "Enhancement of block chain security using re authentication of digital signatures." International Journal of Engineering & Technology 7, no. 1.1 (2017): 667. http://dx.doi.org/10.14419/ijet.v7i1.1.10824.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textLin, Chen, Shu Feng Zhao, and Shi Ping Chen. "RFID Secure Protocol Based on Time-Based Hash Chain." Advanced Materials Research 980 (June 2014): 225–29. http://dx.doi.org/10.4028/www.scientific.net/amr.980.225.
Full textLi, Xiangyang, and Charu Chandra. "Toward a secure supply chain: A system's perspective." Human Systems Management 27, no. 1 (2008): 73–86. http://dx.doi.org/10.3233/hsm-2008-27107.
Full textLee, Yong-Joon. "Defense ICT Supply Chain Security Threat Response Plan." Jouranl of Information and Security 20, no. 4 (2020): 125–34. http://dx.doi.org/10.33778/kcsa.2020.20.4.125.
Full textYang, Yi-Chih. "Risk management of Taiwan’s maritime supply chain security." Safety Science 49, no. 3 (2011): 382–93. http://dx.doi.org/10.1016/j.ssci.2010.09.019.
Full textKhan, R. A., and K. Mustafa. "From threat to security indexing: a causal chain." Computer Fraud & Security 2009, no. 5 (2009): 9–12. http://dx.doi.org/10.1016/s1361-3723(09)70059-4.
Full textSafa, Nader Sohrabi. "The information security landscape in the supply chain." Computer Fraud & Security 2017, no. 6 (2017): 16–20. http://dx.doi.org/10.1016/s1361-3723(17)30053-2.
Full textForte, Domenic, Ron Perez, Yongdae Kim, and Swarup Bhunia. "Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]." Computer 49, no. 8 (2016): 12–16. http://dx.doi.org/10.1109/mc.2016.260.
Full textLu, Guanyi, and Xenophon Koufteros. "Organizing Practices to Combat Supply Chain Security Breaches." IEEE Engineering Management Review 47, no. 3 (2019): 72–78. http://dx.doi.org/10.1109/emr.2019.2931540.
Full textMin, Hokey, Yong Kon Lim, and Jong Won Park. "Supply chain analytics for enhancing the maritime security." International Journal of Logistics Systems and Management 28, no. 2 (2017): 164. http://dx.doi.org/10.1504/ijlsm.2017.086352.
Full textLim, Yong Kon, Jong Won Park, and Hokey Min. "Supply chain analytics for enhancing the maritime security." International Journal of Logistics Systems and Management 28, no. 2 (2017): 164. http://dx.doi.org/10.1504/ijlsm.2017.10007118.
Full text