Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
supply chains
biblio
Cloud supply chain resilience
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
information and communication technologies
supply chains
supply chain theory
supply chain resilience concept
supply chain management
resilience
pubcrawl170112
outsourcing benefits
organisational resilience (OR)
organisational resilience
Cloud Computing
ICT services supply chain
ICT operational resilience
coordination mechanisms
Context
Computational modeling
cloud supply chain resilience
cloud supply chain (CSC) resilience
cloud computing environments (CCE)
biblio
Research on income distribution model of supply chain financing based on third-party trading platform
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
industrial economics
third-party trading platform
supply chains
supply chain financing
Stability analysis
Shapley value
security
risk correction factors
risk analysis
remuneration
pubcrawl170112
AHP
income unequal distribution
income fluctuation
income distribution model
game theory
ethics
cooperative game
Companies
Banking
analytic hierarchy process
biblio
Risk assessment of agricultural supply chain based on AHP- FCS in Eastern Area of Hunan Province
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
natural disasters
the AHP- FCS method
supply chains
Supply Chain
security
risk management
risk assessment
risk analysis
Reliability
pubcrawl170112
agricultural product
Hunan province
fuzzy set theory
fuzzy comprehensive analysis
Face
economic development stability
analytic hierarchy process
AHP- FCS
agricultural supply chain
agricultural products
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
A Quantity-Flexibility Contract in Two-Stage Decision with Supply Chain Coordination
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
optimal replenishment strategy
wholesale price
updated inventory status
two-period dynamic programming model
supply chains
supply chain coordination
Stackelberg game
returning units
retailing
retailer
quantity-flexibility supply contract
pubcrawl170112
Pricing
buyback price
Numerical models
Mathematical model
manufacturing
manufacturer price scheme
inventory management
incremental units
game theory
fixed quantity
dynamic programming
Decision Making
contracts
biblio
A methodology to improve the assessment of vulnerability on the maritime supply chain of energy
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
Oceans
worldwide maritime network
world traffic
vulnerability assessment
transportation possibilities
Transportation
supply chains
supply chain management
spatial structure
security
Sea measurements
raw materials
pubcrawl170112
Ports (Computers)
economic dependency
network modelling
merchant navy
maritime territories
maritime supply chain
maritime safety
maritime network
marine systems
marine communication
industrialized countries
graph theory
freight distribution
freight containers
freight containerization
biblio
Current efforts in ports and supply chains risk assessment
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
pubcrawl170112
supply chains
supply chain risk assessment
supply chain partners
Supply Chain
standards
security of data
security
sea ports
risk management
risk assessment
CII
Ports (Computers)
port service risk assessment
physical /cyber security
maritime supply chain processes
Marine vehicles
marine engineering
goods dispatch data processing
critical infrastructures
critical information infrastructures
complex interrelated ICT systems
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
System security engineering vulnerability assessments for mission-critical systems and functions
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
supply chains
vulnerability identification
vulnerability assessment
US Department of Defense
testing
Systems engineering and theory
systems engineering
system security engineering vulnerability assessments
system security engineering
system security
system maturity points
Databases
Software
security of data
security
pubcrawl170112
mission-critical systems
mission-critical functions
military computing
DoD
Department of Defense
defense systems
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »