Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks.
Nafisa AnjumNazmus SakibJuan Rodriguez CardenasCorey BrookinsAva NorouziniaAsia ShaversMiranda DominguezMarie NassifHossain ShahriarPublished in: COMPSAC (2023)
Keyphrases
- supply chain
- supply chain management
- inventory management
- bullwhip effect
- security risks
- security vulnerabilities
- supplier selection
- software development
- information systems
- decision making
- virtual enterprise
- inventory control
- lead time
- discrete event simulation
- uncertain demand
- attack graphs
- service level
- software systems
- economic order quantity
- small and medium size
- trading partners
- attack graph
- small and medium enterprises
- data mining
- revenue sharing