Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Traceability in Supply Chains: A Cyber Security Analysis

Publication Type:

Journal Article

Authors:

Naeem Firdous Syed; Syed W. Shah; RolandoTrujillo-Rasua; Robin Doss

Source:

Computers & Security (2021)
  • 1599 reads
  • Google Scholar
  • RTF
  • EndNote XML

References

Urciuoli, Luca, Toni Männistö, Juha Hintsa, and Tamanna Khan. "Supply Chain Cyber Security – Potential Threats." Information & Security: An International Journal 29, no. 1 (2013): 51-68.

Check also our Google Scholar profile

  • Downloads
  • How to cite
No files have yet been downloaded.
APA style: Syed, N. Firdous, Shah S. W., -Rasua RT., & Doss R. (2021).  Traceability in Supply Chains: A Cyber Security Analysis. Computers & Security .
Chicago style: Syed, Naeem Firdous, Syed W. Shah, RolandoTrujillo -Rasua, and Robin Doss. "Traceability in Supply Chains: A Cyber Security Analysis." Computers & Security (2021).
IEEE style: Syed, N. Firdous, S. W. Shah, RT. -Rasua, and R. Doss, "Traceability in Supply Chains: A Cyber Security Analysis", Computers & Security , 10 November 2021.
  • Trending
  • Latest
  • Most cited
  • How Networks of Social Cooperation Scale into Civilizations (2,448)
  • Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities (1,756)
  • Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative (1,725)
  • Maritime Cyber(in)security: A Growing Threat Imperils EU Countries (1,694)
  • Lessons for NATO to Be Learned from Putin's War in Ukraine: Global Health Engagement, Interoperability, and Lethality (1,658)
view all
  • A Reciprocal Relation: How Taliban and the World See Each Other
  • Security Threats of Radicalism through Social Media amid Covid-19 Pandemic: Indonesia’s Perspective
  • NATO and Intermediate Force Capabilities: Why Human Effects Matter
  • Launching Narrative into the Information Battlefield
  • Gaming Intermediate Force Capabilities: Strategic Implications of Tactical Decisions
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2023
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal