Login / Signup
A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain.
Shuva Paul
Yu-Cheng Chen
Santiago Grijalva
Vincent John Mooney
Published in:
ISGT (2022)
Keyphrases
</>
supply chain
supply chain management
decision making
dynamic programming
decision makers
sensitivity analysis
lead time
supplier selection