Invisible Supply Chain Attacks Based on Trojan Source.
Emanuele BuchicchioLuca GrilliEros CapobiancoSalvatore CiprianoDiego AntoniniPublished in: Computer (2022)
Keyphrases
- supply chain
- supply chain management
- lead time
- bullwhip effect
- supplier selection
- inventory management
- market demand
- quantity discount
- operating costs
- distribution centers
- decision making
- capacity planning
- small and medium size
- planning horizon
- inventory control
- customer demand
- cost savings
- service level
- lot sizing
- trading agents
- trading partners
- rfid technology
- security protocols
- uncertain demand
- smart card
- data mining