Timelines for In-Code Discovery of Zero-Day Vulnerabilities and Supply-Chain Attacks.
Andrew J. LohnPublished in: CoRR (2018)
Keyphrases
- supply chain
- countermeasures
- security vulnerabilities
- security risks
- sql injection
- supply chain management
- security mechanisms
- information security
- lead time
- service level
- inventory management
- bullwhip effect
- decision making
- capacity planning
- quantity discount
- security issues
- market demand
- operating costs
- inventory control
- customer demand
- revenue sharing
- uncertain demand
- cost savings
- supplier selection
- small and medium size
- security protocols
- joint replenishment
- rfid technology
- planning horizon
- dos attacks