To see the other types of publications on this topic, follow the link: Chain of Security.

Journal articles on the topic 'Chain of Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Chain of Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

de Goede, Marieke. "The chain of security." Review of International Studies 44, no. 1 (2017): 24–42. http://dx.doi.org/10.1017/s0260210517000353.

Full text
Abstract:
AbstractIncreasingly, private companies – including Twitter, airlines, and banks – find themselves in the frontline of fighting terrorism and other security threats, because they are obliged to mine and expel suspicious transactions. This analytical work of companies forms part of a chain, whereby transactions data are analysed, collected, reported, shared, and eventually deployed as a basis for intervention by police and prosecution. This article develops the notion of theChain of Securityin order to conceptualise the ways in which security judgements are made across public/private domains an
APA, Harvard, Vancouver, ISO, and other styles
2

Williams, Zachary, Jason E. Lueg, Sean P. Goffnett, Stephen A. LeMay, and Robert L. Cook. "Understanding supply chain security strategy." Journal of Transportation Management 23, no. 1 (2012): 7–25. http://dx.doi.org/10.22237/jotm/1333238520.

Full text
Abstract:
In the post-9/11 environment, organizations are acutely aware of the need to secure their supply chains from risks of being a target of, or an unwilling participant in, a terror attack. However, supply chain security (SCS) comes at a cost and increasing levels of protection have increasing levels of costs to the firm. So some firms engage in strategic initiatives to secure the supply chain (SC) while others do not; and each firm engages in varying degrees of activities to ensure SCS. Therefore, in this study, the researchers sought to explore what types of SCS strategies exist. The researchers
APA, Harvard, Vancouver, ISO, and other styles
3

PN, Sindhuja. "Impact of information security initiatives on supply chain performance." Information Management & Computer Security 22, no. 5 (2014): 450–73. http://dx.doi.org/10.1108/imcs-05-2013-0035.

Full text
Abstract:
Purpose – The purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and inter-organization information security aspects that are deemed to have an influence on supply chain operations and performance. Design/methodology/approach – Based on extant information security management and supply chain security management literature, a conceptual model was developed and validated. A questionnaire survey instrument was developed and administered among supply chain managers to collect data.
APA, Harvard, Vancouver, ISO, and other styles
4

Walker, Simon. "Security in the value chain." Computer Fraud & Security 2011, no. 7 (2011): 16–18. http://dx.doi.org/10.1016/s1361-3723(11)70074-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Viega, John, and James Bret Michael. "Struggling With Supply-Chain Security." Computer 54, no. 7 (2021): 98–104. http://dx.doi.org/10.1109/mc.2021.3075412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shafiu, Ibrahim, William Yu Chung Wang, and Harminder Singh. "Information Security Compliance Behaviour of Supply Chain Stakeholders." International Journal of Information Systems and Supply Chain Management 9, no. 1 (2016): 1–16. http://dx.doi.org/10.4018/ijisscm.2016010101.

Full text
Abstract:
Supply chain security is an emerging topic in the supply chain management literature. Information security is a key component of supply chain security, and this study aims to identify the factors that influence the compliance behaviour with respect to information security. A related objective is to understand the extent to which compliance was substantive or symbolic. Adopting a qualitative approach, the authors conducted semi-structured interviews with stakeholders based in New Zealand who are involved in international supply chains. The interviews find that compliance behaviour is affected b
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Sheng, Cheng Zhou, and Cheng Wang. "Security Service Function Chain based on Software-Defined Security." Journal of Physics: Conference Series 2010, no. 1 (2021): 012083. http://dx.doi.org/10.1088/1742-6596/2010/1/012083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

P.N., Sindhuja. "The impact of information security initiatives on supply chain robustness and performance: an empirical study." Information & Computer Security 29, no. 2 (2021): 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.

Full text
Abstract:
Purpose Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information security has widened as information has become a critical supply chain asset, making it more important to protect the organization’s data. Today’s global supply chains rely upon the speedy and robust dissemination of information among supply chain partners. Hence, processing of accurate supply chain information is quintessential to ensure the robustness and performance of supply chains. An effective informati
APA, Harvard, Vancouver, ISO, and other styles
9

Véronneau, Simon, and Jacques Roy. "Security at the source: securing today’s critical supply chain networks." Journal of Transportation Security 7, no. 4 (2014): 359–71. http://dx.doi.org/10.1007/s12198-014-0149-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bruzzone, Agostino G., Francesco Longo, Marina Massei, Letizia Nicoletti, and Matteo Agresta. "Safety and Security in Fresh Good Supply Chain." International Journal of Food Engineering 10, no. 4 (2014): 545–56. http://dx.doi.org/10.1515/ijfe-2014-0020.

Full text
Abstract:
Abstract This paper proposes a model aimed at investigating safety and security issues in fresh good supply chain. Particular attention is paid on fresh goods contamination since the increasing complexity of supply chains makes these events more likely to happen. To this end, a discrete event simulator (DES) underpinned by an analytical model has been developed as a support tool for prevention and mitigation. Indeed, the simulation model is able to recreate the disruption wave propagation along the supply chain due to a contamination event as well as the effects on the dynamic evolution of con
APA, Harvard, Vancouver, ISO, and other styles
11

Kenny, Steven. "Strengthening the network security supply chain." Computer Fraud & Security 2017, no. 12 (2017): 11–14. http://dx.doi.org/10.1016/s1361-3723(17)30108-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hintsa, Juha, Ximena Gutierrez, Philip Wieser, and Ari Pekka Hameri. "Supply Chain Security Management: an overview." International Journal of Logistics Systems and Management 5, no. 3/4 (2009): 344. http://dx.doi.org/10.1504/ijlsm.2009.022501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Urciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29 (2013): 51–68. http://dx.doi.org/10.11610/isij.2904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cards, Smart. "Block chain security in smart cards." JIMS8M: The Journal of Indian Management & Strategy 24, no. 1 (2019): 63. http://dx.doi.org/10.5958/0973-9343.2019.00009.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Kun, Haoting Shen, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. "Hardware-Enabled Pharmaceutical Supply Chain Security." ACM Transactions on Design Automation of Electronic Systems 23, no. 2 (2018): 1–26. http://dx.doi.org/10.1145/3144532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gracia, Marco A. Lara, and Shimon Y. Nof. "Conflict resolution in supply chain security." International Journal of Value Chain Management 3, no. 2 (2009): 168. http://dx.doi.org/10.1504/ijvcm.2009.026956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vidhate, Amarsinh V., Chitra Ramesh Saraf, Mrunal Anil Wani, Sweta Siddarth Waghmare, and Teresa Edgar. "Applying Blockchain Security for Agricultural Supply Chain Management." International Journal of Applied Evolutionary Computation 11, no. 4 (2020): 28–37. http://dx.doi.org/10.4018/ijaec.2020100103.

Full text
Abstract:
Blockchain technology permits a highly secured record keeping and digital transaction. Blockchain technology is changing the digital world and industry by bringing a new view to security, transparency, and efficiency of systems. It provides a safe way for the exchange of products, services, or transaction. Blockchain will enable more agile value chains, faster product innovations, closer customer relationship sector. This paper provides an overview of blockchain technology and its potential in developing a secure and reliable agriculture supply chain management. Agriculture supply chain manage
APA, Harvard, Vancouver, ISO, and other styles
18

Urciuoli, Luca, Sangeeta Mohanty, Juha Hintsa, and Else Gerine Boekesteijn. "The resilience of energy supply chains: a multiple case study approach on oil and gas supply chains to Europe." Supply Chain Management: An International Journal 19, no. 1 (2014): 46–63. http://dx.doi.org/10.1108/scm-09-2012-0307.

Full text
Abstract:
Purpose – The purpose of this paper is to enhance the understanding about how energy supply chains work to build resilience against exogenous security threats and thereafter what support mechanisms should be introduced or improved by the European Union. Design/methodology/approach – Five case studies and data collection from multiple sources is used to understand what exogenous security threats could lead to the disruption of oil and gas flows to Europe, how energy companies, from a supply chain perspective, are working to manage these threats and finally, how the EU may coordinate the securit
APA, Harvard, Vancouver, ISO, and other styles
19

Somani, Vikas, and Dr Munesh Chandra Trivedi. "A Review on Block Chain in Cloud Computing Healthcare Data Security." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11 (2019): 55–59. http://dx.doi.org/10.5373/jardcs/v11i11/20193168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Urciuoli, Luca, and Juha Hintsa. "Differences in security risk perceptions between logistics companies and cargo owners." International Journal of Logistics Management 27, no. 2 (2016): 418–37. http://dx.doi.org/10.1108/ijlm-02-2014-0034.

Full text
Abstract:
Purpose – Supply chain stakeholders may perceive security risks differently and thereby misalign mitigation strategies. Hence, causing weak spots in supply chains and thereby disruptions. The purpose of this paper is to determine whether supply chain companies actually perceive security risks and effectiveness of mitigation strategies differently. Design/methodology/approach – Two survey studies measuring perception of security risks and effectiveness of measures have been developed and used to collect data from European and Latin American companies, grouped as cargo owners and logistics compa
APA, Harvard, Vancouver, ISO, and other styles
21

Irani, Zahir, and Amir M. Sharif. "Sustainable food security futures." Journal of Enterprise Information Management 29, no. 2 (2016): 171–78. http://dx.doi.org/10.1108/jeim-12-2015-0117.

Full text
Abstract:
Purpose – The purpose of this paper is to signpost the genesis of food security and associated factors such that organisations, enterprises, policy makers and interested stakeholders can seek to explore and understand this important societal issue. The challenges that food security poses are eclectic in nature and cut through country, society, organisation and individual boundaries. Only through identifying these factors – hence identifying underlying factors of food waste and usage of information within food supply chains to untangle them – can we adopt enterprise interventions in order to in
APA, Harvard, Vancouver, ISO, and other styles
22

Ghadge, Abhijeet, Maximilian Weiß, Nigel D. Caldwell, and Richard Wilding. "Managing cyber risk in supply chains: a review and research agenda." Supply Chain Management: An International Journal 25, no. 2 (2019): 223–40. http://dx.doi.org/10.1108/scm-10-2018-0357.

Full text
Abstract:
Purpose In spite of growing research interest in cyber security, inter-firm based cyber risk studies are rare. Therefore, this study aims to investigate cyber risk management in supply chain contexts. Design/methodology/approach Adapting a systematic literature review process, papers from interdisciplinary areas published between 1990 and 2017 were selected. Different typologies, developed for conducting descriptive and thematic analysis, were established using data mining techniques to conduct a comprehensive, replicable and transparent review. Findings The review identifies multiple future r
APA, Harvard, Vancouver, ISO, and other styles
23

Venter, Hein S. "Security issues in the security cyber supply chain in South Africa." Technovation 34, no. 7 (2014): 392–93. http://dx.doi.org/10.1016/j.technovation.2014.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Yi, Hong-qi Zhang, Jiang Liu, and Ying-jie Yang. "A New Approach for Delivering Customized Security Everywhere: Security Service Chain." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/9534754.

Full text
Abstract:
Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction of executing functions as software components in virtual machines or containers provisioned in standard hardware resources. They enable network to provide customized security service by deploying Security Service Chain (SSC), which refers to steering flow through multiple security functions in a particular order specified by individual user or a
APA, Harvard, Vancouver, ISO, and other styles
25

Sobb, Theresa, Benjamin Turnbull, and Nour Moustafa. "Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions." Electronics 9, no. 11 (2020): 1864. http://dx.doi.org/10.3390/electronics9111864.

Full text
Abstract:
Supply chain 4.0 denotes the fourth revolution of supply chain management systems, integrating manufacturing operations with telecommunication and Information Technology processes. Although the overarching aim of supply chain 4.0 is the enhancement of production systems within supply chains, making use of global reach, increasing agility and emerging technology, with the ultimate goal of increasing efficiency, timeliness and profitability, Supply chain 4.0 suffers from unique and emerging operational and cyber risks. Supply chain 4.0 has a lack of semantic standards, poor interoperability, and
APA, Harvard, Vancouver, ISO, and other styles
26

박홍규 and 정재완. "A Conceptual Study on Supply Chain Security." KOREA INTERNATIONAL COMMERCIAL REVIEW 28, no. 2 (2013): 221–41. http://dx.doi.org/10.18104/kaic.28.2.201306.221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Balasubramaniam, Yamunaa, and Sathyanarayanan PSV. "Enhancing Connected Vehicle Security with Block chain." International Journal of Advances in Scientific Research and Engineering 4, no. 8 (2018): 189–93. http://dx.doi.org/10.31695/ijasre.2018.32849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Haq, Shahid Ul, and Yashwant Singh. "On IoT Security ModelsTraditional and Block chain." International Journal of Computer Sciences and Engineering 06, no. 03 (2018): 26–31. http://dx.doi.org/10.26438/ijcse/v6si3.2631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ulhaq, Irfan, Kevin Titus Kuruvilla, Mathews Nkhoma, Hanh Hong Vu, and Ngan Truong Tuyet. "INFORMATION SECURITY RISKS IN SUPPLY CHAIN MANAGEMENT:." International Journal of Information Systems and Engineering 4, no. 2 (2016): 58–68. http://dx.doi.org/10.24924/ijise/2016.11/v4.iss2/58.68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ali, Sk Subidh, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty. "Supply-Chain Security of Digital Microfluidic Biochips." Computer 49, no. 8 (2016): 36–43. http://dx.doi.org/10.1109/mc.2016.224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sokolov, Alexander, Vladimir Mesropyan, and Alexander Chulok. "Supply chain cyber security: A Russian outlook." Technovation 34, no. 7 (2014): 389–91. http://dx.doi.org/10.1016/j.technovation.2014.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Finne, Thomas. "The information security chain in a company." Computers & Security 15, no. 4 (1996): 297–316. http://dx.doi.org/10.1016/0167-4048(96)88941-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Balick, Rachel. "DIR reform, supply chain security, and more." Pharmacy Today 27, no. 7 (2021): 65–66. http://dx.doi.org/10.1016/j.ptdy.2021.06.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Staniewska, Ewa. "Selected aspects of supply chain security management." Systemy Logistyczne Wojsk 54, no. 1 (2021): 135–48. http://dx.doi.org/10.37055/slw/140379.

Full text
Abstract:
W obecnych warunkach pojęcie bezpieczeństwa nabiera szczególnego znaczenia zarówno w aspekcie społecznym jak i gospodarczym. Celem pracy jest wskazanie kluczowych składników wpływających na bezpieczeństwo oraz obszarów i elementów doskonalenia podejmowanych działań w łańcuchach dostaw. Osiągnięcie celu pracy wymaga identyfikacji istoty łańcuchów dostaw oraz kluczowych obszarów ich bezpieczeństwa. W pracy wskazano na kluczowe obszary wpływające na bezpieczeństwo łańcuchów dostaw oraz elementy doskonalenia podejmowanych działań w zarządzaniu łańcuchami dostaw. Jako metodę badawczą zastosowano an
APA, Harvard, Vancouver, ISO, and other styles
35

Allouch, Azza, Omar Cheikhrouhou, Anis Koubâa, Khalifa Toumi, Mohamed Khalgui, and Tuan Nguyen Gia. "UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones." Sensors 21, no. 9 (2021): 3049. http://dx.doi.org/10.3390/s21093049.

Full text
Abstract:
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. However, they are still prone to many security issues that threaten public safety. Security becomes even more challenging when they are connected to the Internet as their data stream is exposed to attacks. Unmanned traffic management (UTM) represents one of the most important topics for small unmanned aerial systems for beyond-line-of-sight operations in controlled low-altitude airspace. However, without securing the flight path exchanges between drones and ground stations or control centers, ser
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Yao, and Jing Lu. "China's Oil Imports Supply Chain Safety Evaluation." Advanced Materials Research 1030-1032 (September 2014): 2538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.2538.

Full text
Abstract:
Oil is an important energy source and it plays an significant role in the economic development of a country. With the continuous improvement of our dependence on foreign oil, supply chain security of imported oil has become the focus in all aspects. This paper analyzes the various factors that affect the supply chain security of China's imported oil, establishes the evaluation index system and uses fuzzy analytic hierarchy process to evaluate the supply chain security of China’s imported oil, at last proposes suggestions to strengthen oil supply chain security.
APA, Harvard, Vancouver, ISO, and other styles
37

Ivanova, М., V. Smiesova, A. Tkachenko, M. Boichenko, and T. Arkhypenko. "EFFICIENCY OF THE LOGISTICS CHAIN AS A FACTOR OF ECONOMIC SECURITY OF ENTERPRISES." Financial and credit activity: problems of theory and practice 2, no. 37 (2021): 151–60. http://dx.doi.org/10.18371/fcaptp.v2i37.229950.

Full text
Abstract:
Abstract. The basis of economic and financial security of the enterprise is effective financial and economic activity, stable financial condition, rational use of financial resources, the ability to counter threats to the internal and external environment. One of the factors of effective financial and economic activity and economic security of enterprises is the formation of effective logistics chains that provide its participants with opportunities to counter threats to the internal and external environment. Formation of effective logistics chains on the basis of taking into account the econo
APA, Harvard, Vancouver, ISO, and other styles
38

Kafeero, Edward. "Profiting from the Authorized Economic Operator Paradigm in the Era of Global Value Chains: A Conceptual and Legal Analysis." International Conference on Advances in Business, Management and Law (ICABML) 2017 1, no. 1 (2017): 467–76. http://dx.doi.org/10.30585/icabml-cp.v1i1.38.

Full text
Abstract:
This paper analyses the conceptual and legal development of the Authorized Economic Operator (AEO) paradigm over the past three decades. Compliance management, supply chain security and trade facilitation are found to be the underlying objectives behind AEO programs. The paper examines the dynamics of global value chains (GVCs) and concludes that AEO programs are beneficial to GVCs. The Revised Kyoto Convention, The SAFE Framework of Standards and the Trade Facilitation Agreement are identified as the basic international legal (and regulatory) framework that guides AEO programs.
 Key word
APA, Harvard, Vancouver, ISO, and other styles
39

Rajasekhar, K., N. Raga Rohith, G. N V Krishna Mohan, D. Divya, and Ch Jaya Bharathi. "Enhancement of block chain security using re authentication of digital signatures." International Journal of Engineering & Technology 7, no. 1.1 (2017): 667. http://dx.doi.org/10.14419/ijet.v7i1.1.10824.

Full text
Abstract:
Block chain technology first got confined to crypto currencies but later has seen its image in varied applications and hence there is a lot of need to improve its security according to the application. Because of the current digital world revolution there are both the need of its implementation for safe and secure transactions, implementations and at the same time the threats it has been facing day by day. This also could be more efficiently implemented when there is a regulating authority set over for the whole network to whom a particular user can ask to if there is any problem. In this pape
APA, Harvard, Vancouver, ISO, and other styles
40

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO, and other styles
41

Lin, Chen, Shu Feng Zhao, and Shi Ping Chen. "RFID Secure Protocol Based on Time-Based Hash Chain." Advanced Materials Research 980 (June 2014): 225–29. http://dx.doi.org/10.4028/www.scientific.net/amr.980.225.

Full text
Abstract:
This paper describes several typical RFID privacy protection protocol security methods. To improve the security of RFID protocols, which proposed in the literature and some deficiencies, propose a new time-based hash chain function. The program can be effective against security issues, such as unauthorized reading, location tracking, eavesdropping, spoofing, replay and etc. The program applies to a higher number of tags and readers, with better security and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Xiangyang, and Charu Chandra. "Toward a secure supply chain: A system's perspective." Human Systems Management 27, no. 1 (2008): 73–86. http://dx.doi.org/10.3233/hsm-2008-27107.

Full text
Abstract:
Security management has become a critical topic that supply systems have to handle on a daily basis. An integrated view is not in place yet, despite that related studies have existed in disparate pieces and keep on emerging. This paper seeks an essential paradigm shift to design/management for security (DMfSec) within the context of supply chain management. The first part is devoted to defining a new discipline of security centric supply chain management (SecSCM). We identify its fundamental tasks and requirements aided by a metaphor borrowed from information security. The second part is a dis
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Yong-Joon. "Defense ICT Supply Chain Security Threat Response Plan." Jouranl of Information and Security 20, no. 4 (2020): 125–34. http://dx.doi.org/10.33778/kcsa.2020.20.4.125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yang, Yi-Chih. "Risk management of Taiwan’s maritime supply chain security." Safety Science 49, no. 3 (2011): 382–93. http://dx.doi.org/10.1016/j.ssci.2010.09.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Khan, R. A., and K. Mustafa. "From threat to security indexing: a causal chain." Computer Fraud & Security 2009, no. 5 (2009): 9–12. http://dx.doi.org/10.1016/s1361-3723(09)70059-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Safa, Nader Sohrabi. "The information security landscape in the supply chain." Computer Fraud & Security 2017, no. 6 (2017): 16–20. http://dx.doi.org/10.1016/s1361-3723(17)30053-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Forte, Domenic, Ron Perez, Yongdae Kim, and Swarup Bhunia. "Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]." Computer 49, no. 8 (2016): 12–16. http://dx.doi.org/10.1109/mc.2016.260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lu, Guanyi, and Xenophon Koufteros. "Organizing Practices to Combat Supply Chain Security Breaches." IEEE Engineering Management Review 47, no. 3 (2019): 72–78. http://dx.doi.org/10.1109/emr.2019.2931540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Min, Hokey, Yong Kon Lim, and Jong Won Park. "Supply chain analytics for enhancing the maritime security." International Journal of Logistics Systems and Management 28, no. 2 (2017): 164. http://dx.doi.org/10.1504/ijlsm.2017.086352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lim, Yong Kon, Jong Won Park, and Hokey Min. "Supply chain analytics for enhancing the maritime security." International Journal of Logistics Systems and Management 28, no. 2 (2017): 164. http://dx.doi.org/10.1504/ijlsm.2017.10007118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!