Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks.
Colin ToppingAndrew DwyerOla Aleksandra MichalecBarnaby CraggsAwais RashidPublished in: Comput. Secur. (2021)
Keyphrases
- supply chain
- cyber security
- critical infrastructure
- smart grid
- supplier selection
- intrusion detection
- supply chain management
- cyber attacks
- lead time
- bullwhip effect
- distribution centers
- uncertain demand
- service level
- network security
- intrusion detection system
- visual analytics
- information security
- security issues
- anomaly detection
- control system
- lot sizing
- inventory control
- data mining techniques