PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
Xin LiuYixiong WuQingchen YuShangru SongYue LiuQingguo ZhouJianwei ZhugePublished in: ESEM (2022)
Keyphrases
- supply chain
- supply chain management
- proximity graph
- lead time
- capacity planning
- decision making
- operating costs
- bullwhip effect
- quantity discount
- inventory management
- supplier selection
- mobile devices
- revenue sharing
- information security
- service level
- radio frequency identification rfid
- market demand
- customer demand
- trading agents
- random variables