Login / Signup

A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain.

Shuva PaulYu-Cheng ChenSantiago GrijalvaVincent John Mooney
Published in: ISGT (2022)
Keyphrases
  • supply chain
  • supply chain management
  • decision making
  • dynamic programming
  • decision makers
  • sensitivity analysis
  • lead time
  • supplier selection