{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T14:43:25Z","timestamp":1769006605028,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T00:00:00Z","timestamp":1692576000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005049","name":"Science and Engineering Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005049","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,21]]},"DOI":"10.1109\/pst58708.2023.10320170","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:06:27Z","timestamp":1700679987000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment"],"prefix":"10.1109","author":[{"given":"Leila","family":"Rashidi","sequence":"first","affiliation":[{"name":"University of New Brunswick,Canadian Institute for Cybersecurity,Fredericton,Canada"}]},{"given":"Windhya Hansinie","family":"Rankothge","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Canadian Institute for Cybersecurity,Fredericton,Canada"}]},{"given":"Hesamodin","family":"Mohammadian","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Canadian Institute for Cybersecurity,Fredericton,Canada"}]},{"given":"Rashid Hussain","family":"Khokhar","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Canadian Institute for Cybersecurity,Fredericton,Canada"}]},{"given":"Brian","family":"Frei","sequence":"additional","affiliation":[{"name":"ADGA Group,Ottawa,Canada"}]},{"given":"Shawn","family":"Ellis","sequence":"additional","affiliation":[{"name":"ADGA Group,Ottawa,Canada"}]},{"given":"Lago","family":"Freitas","sequence":"additional","affiliation":[{"name":"ADGA Group,Ottawa,Canada"}]},{"given":"Ali Akbar","family":"Ghorbani","sequence":"additional","affiliation":[{"name":"University of New Brunswick,Canadian Institute for Cybersecurity,Fredericton,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/09600039410070975"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025775"},{"key":"ref3","article-title":"ENISA threat landscape for supply chain attacks","year":"2019","journal-title":"White Paper"},{"issue":"1","key":"ref4","first-page":"21","article-title":"Distributed databasean relevance to business organization","volume":"2","author":"Patil","year":"2011","journal-title":"Journal of Information and Operations Management"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3469195"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2010.5529941"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062845"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.102059"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019000"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2022.107995"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.21533\/pen.v7i4.935"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103511"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-161r1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.07.023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106895"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780161"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s22041371"},{"issue":"3","key":"ref20","first-page":"191","article-title":"An introduction to steganography methods","volume":"1","author":"Hariri","year":"2011","journal-title":"World Applied Programming"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106982"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2021.111608"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987376"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/jcaf.22433"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2018.00019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3457337.3457838"},{"key":"ref27","article-title":"Combining ghost and casper","author":"Buterin","year":"2020"},{"key":"ref28","article-title":"Feasibility of proof of authority as a consensus protocol model","author":"Joshi","year":"2021"},{"key":"ref29","article-title":"Proof-of-authority consensus"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3453161"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2975999"},{"key":"ref32","article-title":"Solana and arbitrum knocked offline, while ethereum evades attack"},{"key":"ref33","article-title":"9-14 network outage initial overview"},{"key":"ref34","article-title":"Hijacking bitcoin: Routing attacks on cryptocurrencies","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"Maria"},{"key":"ref35","article-title":"What is BGP hijacking?"},{"key":"ref36","article-title":"Regional internet registries statistics"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24082"},{"key":"ref38","article-title":"Private vs public blockchains - brief comparison and security risks"}],"event":{"name":"2023 20th Annual International Conference on Privacy, Security and Trust (PST)","location":"Copenhagen, Denmark","start":{"date-parts":[[2023,8,21]]},"end":{"date-parts":[[2023,8,23]]}},"container-title":["2023 20th Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10320127\/10319983\/10320170.pdf?arnumber=10320170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:34:26Z","timestamp":1747805666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10320170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,21]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/pst58708.2023.10320170","relation":{},"subject":[],"published":{"date-parts":[[2023,8,21]]}}}