Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT.
Guodong YeXin LiuSiqi FanYuan TanQingguo ZhouRui ZhouXiaokang ZhouPublished in: Future Gener. Comput. Syst. (2023)
Keyphrases
- supply chain
- supply chain management
- bullwhip effect
- lead time
- quantity discount
- operating costs
- capacity planning
- supplier selection
- service level
- radio frequency identification rfid
- inventory management
- decision making
- inventory control
- cost savings
- customer demand
- trading partners
- trading agents
- market demand
- uncertain demand
- rfid technology
- pricing model
- cloud computing
- planning horizon
- economic order quantity