{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:30:17Z","timestamp":1776112217812,"version":"3.50.1"},"reference-count":241,"publisher":"Association for Computing Machinery (ACM)","issue":"14s","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,12,31]]},"abstract":"<jats:p>The rapid growth of<jats:bold>Information Communication Technologies (ICT)<\/jats:bold>has impacted many fields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every aspect of its end-to-end process. This evolution provides numerous benefits such as profit maximization, loss reduction, and the optimization of supply chain lead times. However, the use of such technologies has also considerably opened up various security threats and risks which have widened the attack surface on the entire end-to-end supply chain. We present a holistic survey on supply chain security. We discuss the different security issues and attacks that target the different supply chain technologies. Then, we discuss various countermeasures and security solutions proposed by academic and industry researchers to mitigate the identified threats. Finally, we provide some recommendations and best practices that can be adopted to achieve a secure supply chain.<\/jats:p>","DOI":"10.1145\/3588999","type":"journal-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T12:23:46Z","timestamp":1679487826000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["Security Threats, Countermeasures, and Challenges of Digital Supply Chains"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-6406","authenticated-orcid":false,"given":"Badis","family":"Hammi","sequence":"first","affiliation":[{"name":"EPITA Engineering School, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8610-3451","authenticated-orcid":false,"given":"Jamel","family":"Nebhen","sequence":"additional","affiliation":[{"name":"Prince Sattam bin Abdulaziz University, KSA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"issue":"1","key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"325","DOI":"10.2753\/MIS0742-1222300110","article-title":"Risk mitigation in supply chain digitization: System modularity and information technology governance","volume":"30","author":"Xue Ling","year":"2013","unstructured":"Ling Xue, Cheng Zhang, Hong Ling, and Xia Zhao. 2013. Risk mitigation in supply chain digitization: System modularity and information technology governance. Journal of Management Information Systems 30, 1 (2013), 325\u2013352.","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"e_1_3_2_3_2","first-page":"47","article-title":"Digital supply chain: Survey of the literature","volume":"9","author":"Iddris Faisal","year":"2018","unstructured":"Faisal Iddris. 2018. Digital supply chain: Survey of the literature. International Journal of Business Research and Management 9, 1 (2018), 47\u201361.","journal-title":"International Journal of Business Research and Management"},{"key":"e_1_3_2_4_2","volume-title":"Principles of Operations Management: Sustainability and Supply Chain Management (Global editon)","author":"Heizer Jay","year":"2017","unstructured":"Jay Heizer, Barry Render, and Chuck Munson. 2017. Principles of Operations Management: Sustainability and Supply Chain Management (Global editon). Pearson."},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.6028\/NIST.IR.8276","volume-title":"Key Practices in Cyber Supply Chain Risk Management: Observations from Industry","author":"Boyens Jon","year":"2021","unstructured":"Jon Boyens, Celia Paulsen, Nadya Bartol, Kris Winkler, and James Gimbi. 2021. Key Practices in Cyber Supply Chain Risk Management: Observations from Industry. Technical Report. National Institute of Standards and Technology (NIST). 1\u201331."},{"issue":"7","key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.technovation.2014.02.001","article-title":"Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems","volume":"34","author":"Boyson Sandor","year":"2014","unstructured":"Sandor Boyson. 2014. Cyber supply chain risk management: Revolutionizing the strategic control of critical IT systems. Technovation 34, 7 (2014), 342\u2013353.","journal-title":"Technovation"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Jonathan D. Linton Sandor Boyson and John Aje. 2014. The challenge of cyber supply chain security to research and practice\u2013An introduction. (2014).","DOI":"10.1016\/j.technovation.2014.05.001"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","DOI":"10.1108\/17410381211276835","article-title":"The inter-disciplinary modelling of supply chains in the context of collaborative multi-structural cyber-physical networks","author":"Ivanov Dmitry","year":"2012","unstructured":"Dmitry Ivanov and Boris Sokolov. 2012. The inter-disciplinary modelling of supply chains in the context of collaborative multi-structural cyber-physical networks. Journal of Manufacturing Technology Management (2012).","journal-title":"Journal of Manufacturing Technology Management"},{"key":"e_1_3_2_9_2","first-page":"5","volume-title":"We Cannot Blindly Reap the Benefits of a Globalized ICT Supply Chain!","author":"Davidson Don","year":"2013","unstructured":"Don Davidson and Stephanie Shankles. 2013. We Cannot Blindly Reap the Benefits of a Globalized ICT Supply Chain!Technical Report. Department of Defense Washington DC Chief Information Officer. 5 pages."},{"issue":"4","key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","article-title":"A systematic survey of industrial internet of things security: Requirements and fog computing opportunities","volume":"22","author":"Tange Koen","year":"2020","unstructured":"Koen Tange, Michele De Donno, Xenofon Fafoutis, and Nicola Dragoni. 2020. A systematic survey of industrial internet of things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials 22, 4 (2020), 2489\u20132520.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/GCWCN.2018.8668630","volume-title":"2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)","author":"Panchal Abhijeet C.","year":"2018","unstructured":"Abhijeet C. Panchal, Vijay M. Khadse, and Parikshit N. Mahalle. 2018. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures. In 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN). IEEE, 124\u2013130."},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"135812","DOI":"10.1109\/ACCESS.2019.2926441","article-title":"A survey of security in SCADA networks: Current issues and future challenges","volume":"7","author":"Ghosh Sagarika","year":"2019","unstructured":"Sagarika Ghosh and Srinivas Sampalli. 2019. A survey of security in SCADA networks: Current issues and future challenges. IEEE Access 7 (2019), 135812\u2013135831.","journal-title":"IEEE Access"},{"issue":"3","key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/COMST.2020.2987688","article-title":"A survey on SCADA systems: Secure protocols, incidents, threats and tactics","volume":"22","author":"Pliatsios Dimitrios","year":"2020","unstructured":"Dimitrios Pliatsios, Panagiotis Sarigiannidis, Thomas Lagkas, and Antonios G. Sarigiannidis. 2020. A survey on SCADA systems: Secure protocols, incidents, threats and tactics. IEEE Communications Surveys & Tutorials 22, 3 (2020), 1942\u20131976.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1504\/IJLSM.2009.022501","article-title":"Supply chain security management: An overview","volume":"5","author":"Hintsa Juha","year":"2009","unstructured":"Juha Hintsa, Ximena Gutierrez, Philip Wieser, and Ari-Pekka Hameri. 2009. Supply chain security management: An overview. International Journal of Logistics Systems and Management 5, 3-4 (2009), 344\u2013355.","journal-title":"International Journal of Logistics Systems and Management"},{"key":"e_1_3_2_15_2","first-page":"1066","volume-title":"2013 International Conference on Social Computing","author":"Lu Tianbo","year":"2013","unstructured":"Tianbo Lu, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, and Hongyu Yang. 2013. Next big thing in big data: The security of the ICT supply chain. In 2013 International Conference on Social Computing. IEEE, 1066\u20131073."},{"issue":"7","key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.technovation.2014.01.005","article-title":"Cyber supply chain security practices DNA\u2013filling in the puzzle using a diverse set of disciplines","volume":"34","author":"Bartol Nadya","year":"2014","unstructured":"Nadya Bartol. 2014. Cyber supply chain security practices DNA\u2013filling in the puzzle using a diverse set of disciplines. Technovation 34, 7 (2014), 354\u2013361.","journal-title":"Technovation"},{"issue":"2","key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/TEM.2017.2652382","article-title":"Supply chain security: A classification of practices and an empirical study of differential effects and complementarity","volume":"64","author":"Lu Guanyi","year":"2017","unstructured":"Guanyi Lu, Xenophon Koufteros, and Lorenzo Lucianetti. 2017. Supply chain security: A classification of practices and an empirical study of differential effects and complementarity. IEEE Transactions on Engineering Management 64, 2 (2017), 234\u2013248.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"e_1_3_2_18_2","article-title":"Managing cyber and information risks in supply chains: Insights from an exploratory analysis","author":"Colicchia Claudia","year":"2019","unstructured":"Claudia Colicchia, Alessandro Creazza, and David A. Menachof. 2019. Managing cyber and information risks in supply chains: Insights from an exploratory analysis. Supply Chain Management: An International Journal (2019).","journal-title":"Supply Chain Management: An International Journal"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.procs.2019.01.108","article-title":"Information systems for supply chain management: Uncertainties, risks and cyber security","volume":"149","author":"Boiko Andrii","year":"2019","unstructured":"Andrii Boiko, Vira Shendryk, and Olha Boiko. 2019. Information systems for supply chain management: Uncertainties, risks and cyber security. Procedia Computer Science 149 (2019), 65\u201370.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"184115","DOI":"10.1109\/ACCESS.2019.2960542","article-title":"A survey on using blockchain in trade supply chain solutions","volume":"7","author":"Juma Hussam","year":"2019","unstructured":"Hussam Juma, Khaled Shaalan, and Ibrahim Kamel. 2019. A survey on using blockchain in trade supply chain solutions. IEEE Access 7 (2019), 184115\u2013184132.","journal-title":"IEEE Access"},{"issue":"2","key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1108\/SCM-10-2018-0357","article-title":"Managing cyber risk in supply chains: A review and research agenda","volume":"25","author":"Ghadge Abhijeet","year":"2019","unstructured":"Abhijeet Ghadge, Maximilian Wei\u00df, Nigel D. Caldwell, and Richard Wilding. 2019. Managing cyber risk in supply chains: A review and research agenda. Supply Chain Management: An International Journal 25, 2 (2019), 223\u2013240.","journal-title":"Supply Chain Management: An International Journal"},{"issue":"8","key":"e_1_3_2_22_2","doi-asserted-by":"crossref","first-page":"6222","DOI":"10.1109\/JIOT.2020.3025775","article-title":"A survey on supply chain security: Application areas, security threats, and solution architectures","volume":"8","author":"Hassija Vikas","year":"2020","unstructured":"Vikas Hassija, Vinay Chamola, Vatsal Gupta, Sarthak Jain, and Nadra Guizani. 2020. A survey on supply chain security: Application areas, security threats, and solution architectures. IEEE Internet of Things Journal 8, 8 (2020), 6222\u20136246.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"11856","DOI":"10.1109\/ACCESS.2020.2964880","article-title":"Blockchain implementations and use cases for supply chains-a survey","volume":"8","author":"Gonczol Peter","year":"2020","unstructured":"Peter Gonczol, Panagiota Katsikouli, Lasse Herskind, and Nicola Dragoni. 2020. Blockchain implementations and use cases for supply chains-a survey. IEEE Access 8 (2020), 11856\u201311871.","journal-title":"IEEE Access"},{"key":"e_1_3_2_24_2","first-page":"564","volume-title":"International Conference on Emerging Internetworking, Data & Web Technologies","author":"Zhang Haibo","year":"2020","unstructured":"Haibo Zhang and Kouichi Sakurai. 2020. Blockchain for IoT-based digital supply chain: A survey. In International Conference on Emerging Internetworking, Data & Web Technologies. Springer, 564\u2013573."},{"key":"e_1_3_2_25_2","article-title":"Cyber security risks in globalized supply chains: Conceptual framework","author":"Pandey Shipra","year":"2020","unstructured":"Shipra Pandey, Rajesh Kumar Singh, Angappa Gunasekaran, and Anjali Kaushik. 2020. Cyber security risks in globalized supply chains: Conceptual framework. Journal of Global Operations and Strategic Sourcing (2020).","journal-title":"Journal of Global Operations and Strategic Sourcing"},{"key":"e_1_3_2_26_2","unstructured":"April 2021. 2021 Must-Know Cyber Attack Statistics and Trends . Technical Report. Embroker."},{"key":"e_1_3_2_27_2","first-page":"1","volume-title":"Internet Security Threat Report (ISTR)","author":"Cleary Gillian","year":"2018","unstructured":"Gillian Cleary, Mayee Corpin, Orla Cox, Hon Lau, Benjamin Nahorney, Dick O\u2019Brien, Brigid O\u2019Gorman, John-Paul Power, Scott Wallace, Paul Wood, and Candid Wuest. 2018. Internet Security Threat Report (ISTR). Technical Report. Symantec. 1\u201389."},{"key":"e_1_3_2_28_2","first-page":"1","volume-title":"2020 in Review, Data Breach Report. Are Consumers at Less Risk?","year":"2021","unstructured":"2021. 2020 in Review, Data Breach Report. Are Consumers at Less Risk?Technical Report. Identity Theft Resource Center (ITRC). 1\u201329."},{"key":"e_1_3_2_29_2","first-page":"52","volume-title":"Cyber Threats to the Mining Industry","author":"Huq Numaan","year":"2016","unstructured":"Numaan Huq. 2016. Cyber Threats to the Mining Industry. Technical Report. Trend Micro. 52 pages."},{"issue":"4","key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.31387\/oscm0290190","article-title":"Supply chain risk classification schemes: A literature review","volume":"10","author":"Hudnurkar Manoj","year":"2017","unstructured":"Manoj Hudnurkar, Sujeet Deshpande, Urvashi Rathod, and Suresh K. Jakhar. 2017. Supply chain risk classification schemes: A literature review. Operations and Supply Chain Management: An International Journal 10, 4 (2017), 182\u2013199.","journal-title":"Operations and Supply Chain Management: An International Journal"},{"issue":"3","key":"e_1_3_2_31_2","first-page":"15","article-title":"Supply chain risk management: Review, classification and future research directions","volume":"6","author":"Singhal Piyush","year":"2011","unstructured":"Piyush Singhal, Gopal Agarwal, and Murali Lal Mittal. 2011. Supply chain risk management: Review, classification and future research directions. International Journal of Business Science & Applied Management (IJBSAM) 6, 3 (2011), 15\u201342.","journal-title":"International Journal of Business Science & Applied Management (IJBSAM)"},{"issue":"1","key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.3926\/jiem.2792","article-title":"A novel classification of supply chain risks: Scale development and validation","volume":"12","author":"Shahbaz Muhammad Saeed","year":"2019","unstructured":"Muhammad Saeed Shahbaz, Raja Zuraidah RM Rasi, and MD Fauzi Bin Ahmad. 2019. A novel classification of supply chain risks: Scale development and validation. Journal of Industrial Engineering and Management (JIEM) 12, 1 (2019), 201\u2013218.","journal-title":"Journal of Industrial Engineering and Management (JIEM)"},{"key":"e_1_3_2_33_2","first-page":"57","volume-title":"ENISA Threat Landscape for Supply Chain Attacks","year":"2021","unstructured":"2021. ENISA Threat Landscape for Supply Chain Attacks. Technical Report. European Union Agency for Cybersecurity (ENISA). 57 pages."},{"key":"e_1_3_2_34_2","volume-title":"Counterfeits in the Supply Chain: A Big Problem and it\u2019s Getting Worse","author":"de Andino J. Michael Martinez","year":"2014","unstructured":"J. Michael Martinez de Andino. February 2014. Counterfeits in the Supply Chain: A Big Problem and it\u2019s Getting Worse. Technical Report. Hunton & Williams LLP."},{"key":"e_1_3_2_35_2","volume-title":"Are there Counterfeits in your Global Supply Chain?","author":"Coates Rosemary","year":"2019","unstructured":"Rosemary Coates. August 2019. Are there Counterfeits in your Global Supply Chain?Technical Report. Logistics management."},{"key":"e_1_3_2_36_2","first-page":"31","volume-title":"2020 Cost of Insider Threats Global Report","year":"2021","unstructured":"2021. 2020 Cost of Insider Threats Global Report. Technical Report. Ponemon Institute. 31 pages."},{"key":"e_1_3_2_37_2","unstructured":"Beau Woods and Andy Bochman. 2018. Supply chain in the software era. (2018) 12."},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.21236\/ADA610495","volume-title":"Supply Chain Attack Framework and Attack Patterns","author":"Miller John F.","year":"2013","unstructured":"John F. Miller. 2013. Supply Chain Attack Framework and Attack Patterns. Technical Report. MITRE Corp Mclean, VA. 86 pages."},{"key":"e_1_3_2_39_2","first-page":"88","article-title":"Supply chain attack patterns: Framework and catalog","author":"Reed Melinda","year":"2014","unstructured":"Melinda Reed, John F. Miller, and Paul Popick. 2014. Supply chain attack patterns: Framework and catalog. Office of the Deputy Assistant Secretary of Defense for Systems Engineering (2014), 88.","journal-title":"Office of the Deputy Assistant Secretary of Defense for Systems Engineering"},{"key":"e_1_3_2_40_2","first-page":"265","volume-title":"Global Brand Counterfeiting Report, 2018","year":"2017","unstructured":"December 2017. Global Brand Counterfeiting Report, 2018. Technical Report. R. Strategic Global. 265 pages."},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","first-page":"749","DOI":"10.2471\/BLT.07.049965","article-title":"Outbreak of acute renal failure in Panama in 2006: A case-control study","volume":"86","author":"Rentz E. Danielle","year":"2008","unstructured":"E. Danielle Rentz, Lauren Lewis, Oscar J. Mujica, Dana B. Barr, Joshua G. Schier, Gayanga Weerasekera, Peter Kuklenyik, Michael McGeehin, John Osterloh, Jacob Wamsley, et\u00a0al. 2008. Outbreak of acute renal failure in Panama in 2006: A case-control study. Bulletin of the World Health Organization 86 (2008), 749\u2013756.","journal-title":"Bulletin of the World Health Organization"},{"key":"e_1_3_2_42_2","volume-title":"Virginia Woman Sentenced to 60 Months in Prison for Importing and Selling Counterfeit Cisco Computer Networking Equipment","year":"2017","unstructured":"September 2017. Updated February. Virginia Woman Sentenced to 60 Months in Prison for Importing and Selling Counterfeit Cisco Computer Networking Equipment. Technical Report. Department of Justice. Office of Public Affairs."},{"issue":"07","key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.4236\/jss.2013.17003","article-title":"The counterfeit electronics problem","volume":"1","author":"Pecht Michael","year":"2013","unstructured":"Michael Pecht et\u00a0al. 2013. The counterfeit electronics problem. Open Journal of Social Sciences 1, 07 (2013), 12.","journal-title":"Open Journal of Social Sciences"},{"key":"e_1_3_2_44_2","volume-title":"Feds: Counterfeit Submarine Parts Shipped to Groton Base","author":"Howard Lee","year":"2013","unstructured":"Lee Howard. July 2013. Feds: Counterfeit Submarine Parts Shipped to Groton Base. Technical Report."},{"key":"e_1_3_2_45_2","volume-title":"GIDEP Alert, Document no. EE-A-06-06B","year":"2006","unstructured":"20, March 2006. GIDEP Alert, Document no. EE-A-06-06B. Technical Report. Government-Industry Data Exchange Program."},{"key":"e_1_3_2_46_2","volume-title":"Woman Helped Sell Fake Chips to US Military","author":"McMillan Robert","year":"2010","unstructured":"Robert McMillan. November 2010. Woman Helped Sell Fake Chips to US Military. Technical Report."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","article-title":"Internet of Things: A survey on the security of IoT frameworks","volume":"38","author":"Ammar Mahmoud","year":"2018","unstructured":"Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 (2018), 8\u201327.","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang Yuchen","year":"2017","unstructured":"Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal 4, 5 (2017), 1250\u20131258.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_49_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/I-SMAC.2017.8058363","volume-title":"2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","author":"Deogirikar Jyoti","year":"2017","unstructured":"Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, 32\u201337."},{"key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta Jayasree","year":"2020","unstructured":"Jayasree Sengupta, Sushmita Ruj, and Sipra Das Bit. 2020. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications 149 (2020), 102481.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","article-title":"Cyber-physical systems security - A survey","volume":"4","author":"Humayed Abdulmalik","year":"2017","unstructured":"Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security - A survey. IEEE Internet of Things Journal 4, 6 (2017), 1802\u20131831.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_52_2","first-page":"1","volume-title":"2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)","author":"Drias Zakarya","year":"2015","unstructured":"Zakarya Drias, Ahmed Serhrouchni, and Olivier Vogel. 2015. Taxonomy of attacks on industrial control protocols. In 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS). IEEE, 1\u20136."},{"key":"e_1_3_2_53_2","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","article-title":"Cloud security issues and challenges: A survey","volume":"79","author":"Singh Ashish","year":"2017","unstructured":"Ashish Singh and Kakali Chatterjee. 2017. Cloud security issues and challenges: A survey. Journal of Network and Computer Applications 79 (2017), 88\u2013115.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.4018\/978-1-5225-8897-9.ch071","volume-title":"Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications","author":"Chowdhury Abdullahi","year":"2019","unstructured":"Abdullahi Chowdhury, Gour Karmakar, and Joarder Kamruzzaman. 2019. Survey of recent cyber security attacks on robotic systems and their mitigation approaches. In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications. IGI Global, 1426\u20131441."},{"issue":"5","key":"e_1_3_2_55_2","first-page":"390","article-title":"A survey on various cyber attacks and their classification","volume":"15","author":"Uma M.","year":"2013","unstructured":"M. Uma and Ganapathi Padmavathi. 2013. A survey on various cyber attacks and their classification. IJ Network Security 15, 5 (2013), 390\u2013396.","journal-title":"IJ Network Security"},{"issue":"2","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/SURV.2009.090205","article-title":"Sensor network security: A survey","volume":"11","author":"Chen Xiangqian","year":"2009","unstructured":"Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou. 2009. Sensor network security: A survey. IEEE Communications Surveys & Tutorials 11, 2 (2009), 52\u201373.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_57_2","volume-title":"D-WARD: Source-end Defense Against Distributed Denial-of-Service Attacks","author":"Mirkovic Jelena","year":"2003","unstructured":"Jelena Mirkovic. 2003. D-WARD: Source-end Defense Against Distributed Denial-of-Service Attacks. Ph.D. Dissertation. University of California, Los Angeles."},{"issue":"3","key":"e_1_3_2_58_2","doi-asserted-by":"crossref","first-page":"e3537","DOI":"10.1002\/ett.3537","article-title":"An empirical investigation of botnet as a service for cyberattacks","volume":"30","author":"Hammi Badis","year":"2019","unstructured":"Badis Hammi, Sherali Zeadally, and Rida Khatoun. 2019. An empirical investigation of botnet as a service for cyberattacks. Transactions on Emerging Telecommunications Technologies 30, 3 (2019), e3537.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"e_1_3_2_59_2","first-page":"1","volume-title":"2014 IEEE Network Operations and Management Symposium (NOMS)","author":"Badis Hammi","year":"2014","unstructured":"Hammi Badis, Guillaume Doyen, and Rida Khatoun. 2014. Understanding botclouds from a system perspective: A principal component analysis. In 2014 IEEE Network Operations and Management Symposium (NOMS). IEEE, 1\u20139."},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.tust.2014.05.005","article-title":"Underground wireless networking: A performance evaluation of communication standards for tunnelling and mining","volume":"43","author":"Kennedy Gareth A.","year":"2014","unstructured":"Gareth A. Kennedy and Michael D. Bedford. 2014. Underground wireless networking: A performance evaluation of communication standards for tunnelling and mining. Tunnelling and Underground Space Technology 43 (2014), 157\u2013170.","journal-title":"Tunnelling and Underground Space Technology"},{"issue":"1","key":"e_1_3_2_61_2","article-title":"Supply chain cyber security\u2013potential threats","volume":"29","author":"Urciuoli Luca","year":"2013","unstructured":"Luca Urciuoli, Toni M\u00e4nnist\u00f6, Juha Hintsa, and Tamanna Khan. 2013. Supply chain cyber security\u2013potential threats. Information & Security: An International Journal 29, 1 (2013).","journal-title":"Information & Security: An International Journal"},{"key":"e_1_3_2_62_2","first-page":"1","volume-title":"2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC)","author":"Sadeghi Ahmad-Reza","year":"2015","unstructured":"Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and privacy challenges in industrial internet of things. In 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC). IEEE, 1\u20136."},{"issue":"2","key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/TII.2020.2974520","article-title":"Deep learning-based DDoS-attack detection for cyber\u2013physical system over 5G Network","volume":"17","author":"Hussain Bilal","year":"2020","unstructured":"Bilal Hussain, Qinghe Du, Bo Sun, and Zhiqiang Han. 2020. Deep learning-based DDoS-attack detection for cyber\u2013physical system over 5G Network. IEEE Transactions on Industrial Informatics 17, 2 (2020), 860\u2013870.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_64_2","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.ijcip.2014.12.002","article-title":"Critical infrastructure protection: Requirements and challenges for the 21st century","volume":"8","author":"Alcaraz Cristina","year":"2015","unstructured":"Cristina Alcaraz and Sherali Zeadally. 2015. Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection 8 (2015), 53\u201366.","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","first-page":"106946","DOI":"10.1016\/j.comnet.2019.106946","article-title":"Cybersecurity in industrial control systems: Issues, technologies, and challenges","volume":"165","author":"Asghar Muhammad Rizwan","year":"2019","unstructured":"Muhammad Rizwan Asghar, Qinwen Hu, and Sherali Zeadally. 2019. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks 165 (2019), 106946.","journal-title":"Computer Networks"},{"issue":"11","key":"e_1_3_2_66_2","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni Emiliano","year":"2018","unstructured":"Emiliano Sisinni, Abusayeed Saifullah, Song Han, Ulf Jennehag, and Mikael Gidlund. 2018. Industrial internet of things: Challenges, opportunities, and directions. IEEE Transactions on Industrial Informatics 14, 11 (2018), 4724\u20134734.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_67_2","first-page":"1","volume-title":"2018 Global Internet of Things Summit (GIoTS)","author":"Temprilho Andr\u00e9","year":"2018","unstructured":"Andr\u00e9 Temprilho, Lu\u00eds N\u00f3brega, Paulo Pedreiras, Pedro Gon\u00e7alves, and S\u00e9rgio Silva. 2018. M2M communication stack for intelligent farming. In 2018 Global Internet of Things Summit (GIoTS). IEEE, 1\u20136."},{"key":"e_1_3_2_68_2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/2808705.2808715","volume-title":"Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and\/or Privacy","author":"Antonioli Daniele","year":"2015","unstructured":"Daniele Antonioli and Nils Ole Tippenhauer. 2015. MiniCPS: A toolkit for security research on CPS networks. In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and\/or Privacy. 91\u2013100."},{"key":"e_1_3_2_69_2","volume-title":"Top Attacks Against Service Providers 2017-2019","author":"Pompon Raymond","year":"2020","unstructured":"Raymond Pompon and Malcolm Heath. February 2020. Top Attacks Against Service Providers 2017-2019. Technical Report."},{"issue":"4","key":"e_1_3_2_70_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1353-4858(13)70045-X","article-title":"Spamhaus DDoS attack fails to take down Internet","volume":"2013","year":"2013","unstructured":"2013. Spamhaus DDoS attack fails to take down Internet. Network Security 2013, 4 (2013), 1\u20132.","journal-title":"Network Security"},{"key":"e_1_3_2_71_2","volume-title":"Top 10 DDoS Attacks in 2020: Comprehensive Guide","author":"Raza Ali","year":"2020","unstructured":"Ali Raza. October 2020. Top 10 DDoS Attacks in 2020: Comprehensive Guide. Technical Report. NameKoddos."},{"key":"e_1_3_2_72_2","first-page":"20","volume-title":"Q1 2020 Threat Report: Distributed Denial of Service (DDoS)","author":"Tony Miu","year":"2020","unstructured":"Miu Tony, Yeung Ricky, Cheung Kitson, and Li Dominic. 2020. Q1 2020 Threat Report: Distributed Denial of Service (DDoS). Technical Report. Nexusguard. 20 pages."},{"key":"e_1_3_2_73_2","first-page":"34","volume-title":"DDoS in a Time of Pandemic","author":"Hummel Richard","year":"2021","unstructured":"Richard Hummel, Carol Hildebrand, Hardik Modi, Chris Conrad, Roland Dobbins, Steinthor Bjarnson, Belanger Jon, Sockrider Gary, Alcoy Philippe, and Bienkowski Tom. 2021. DDoS in a Time of Pandemic. Technical Report. NETSCOUT. 34 pages. Issue ISSUE 6: FINDINGS FROM 2H 2020."},{"key":"e_1_3_2_74_2","first-page":"23","volume-title":"Bulletproof Annual Cyber Security Report 2019","year":"2019","unstructured":"2019. Bulletproof Annual Cyber Security Report 2019. Technical Report. Bulletproof. 23 pages."},{"key":"e_1_3_2_75_2","volume-title":"39 Jaw-Dropping DDoS Statistics to Keep in Mind for 2021","author":"Galov Nick","year":"2021","unstructured":"Nick Galov. January 2021. 39 Jaw-Dropping DDoS Statistics to Keep in Mind for 2021. Technical Report."},{"key":"e_1_3_2_76_2","volume-title":"DDoS Attacks Cost US Businesses $10bn Per Year","author":"Jones Mark","year":"2019","unstructured":"Mark Jones. March 2019. DDoS Attacks Cost US Businesses $10bn Per Year. Technical Report."},{"key":"e_1_3_2_77_2","first-page":"22","volume-title":"2020 A Year in Review","author":"McKeay Martin","year":"2020","unstructured":"Martin McKeay, Steve Ragan, Amanda Goedde, Chelsea Tuttle, Georgina Morales Hampe, and Murali Venukumar. December 2020. 2020 A Year in Review. Technical Report. 22 pages. Issue 4."},{"key":"e_1_3_2_78_2","volume-title":"300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends (2021 Edition)","author":"Zaharia Andra","year":"2021","unstructured":"Andra Zaharia. April 2021. 300+ Terrifying Cybercrime and Cybersecurity Statistics & Trends (2021 Edition). Technical Report."},{"key":"e_1_3_2_79_2","first-page":"10","volume-title":"Q2 2020. The State of DDoS Weapons A Threat Intelligence Report By A10 Networks Security Research","year":"2020","unstructured":"2020. Q2 2020. The State of DDoS Weapons A Threat Intelligence Report By A10 Networks Security Research. Technical Report. A10 Networks. 10 pages."},{"key":"e_1_3_2_80_2","volume-title":"The 15 Top DDoS Statistics You Should Know In 2020","author":"Crane Casey","year":"2019","unstructured":"Casey Crane. November 2019. The 15 Top DDoS Statistics You Should Know In 2020. Technical Report."},{"issue":"16","key":"e_1_3_2_81_2","doi-asserted-by":"crossref","first-page":"3724","DOI":"10.1002\/sec.1539","article-title":"A survey and taxonomy of DoS attacks in cloud computing","volume":"9","author":"Masdari Mohammad","year":"2016","unstructured":"Mohammad Masdari and Marzie Jalali. 2016. A survey and taxonomy of DoS attacks in cloud computing. Security and Communication Networks 9, 16 (2016), 3724\u20133751.","journal-title":"Security and Communication Networks"},{"issue":"1","key":"e_1_3_2_82_2","first-page":"1","article-title":"Analysis of security-based access control models for cloud computing","volume":"12","author":"Choudhary Sandeep","year":"2022","unstructured":"Sandeep Choudhary and Nanhay Singh. 2022. Analysis of security-based access control models for cloud computing. International Journal of Cloud Applications and Computing (IJCAC) 12, 1 (2022), 1\u201319.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.procs.2015.04.245","article-title":"Understanding DDoS attack & its effect in cloud environment","volume":"49","author":"Deshmukh Rashmi V.","year":"2015","unstructured":"Rashmi V. Deshmukh and Kailas K. Devadkar. 2015. Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science 49 (2015), 202\u2013210.","journal-title":"Procedia Computer Science"},{"key":"e_1_3_2_84_2","first-page":"237","article-title":"Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan","volume":"3","author":"Kozlowski Andrzej","year":"2014","unstructured":"Andrzej Kozlowski. 2014. Comparative analysis of cyberattacks on Estonia, Georgia and Kyrgyzstan. European Scientific Journal 3 (2014), 237\u2013245.","journal-title":"European Scientific Journal"},{"issue":"4","key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/S1353-4858(09)70037-6","article-title":"Cyberwar in Estonia and the Middle East","volume":"2009","author":"Jenik Aviram","year":"2009","unstructured":"Aviram Jenik. 2009. Cyberwar in Estonia and the Middle East. Network Security 2009, 4 (2009), 4\u20136.","journal-title":"Network Security"},{"issue":"4","key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2007.98","article-title":"The new front line: Estonia under cyberassault","volume":"5","author":"Lesk Michael","year":"2007","unstructured":"Michael Lesk. 2007. The new front line: Estonia under cyberassault. IEEE Security & Privacy 5, 4 (2007), 76\u201379.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_87_2","first-page":"20","volume-title":"2007 Cyber Attacks on Estonia","year":"2008","unstructured":"2008. 2007 Cyber Attacks on Estonia. Technical Report. 20 pages."},{"issue":"1","key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/2398356.2398377","article-title":"Computer security and the modern home","volume":"56","author":"Denning Tamara","year":"2013","unstructured":"Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. 2013. Computer security and the modern home. Commun. ACM 56, 1 (2013), 94\u2013103.","journal-title":"Commun. ACM"},{"key":"e_1_3_2_89_2","doi-asserted-by":"crossref","first-page":"183532","DOI":"10.1109\/ACCESS.2019.2960367","article-title":"DDoS detection mechanism using trust-based evaluation system in VANET","volume":"7","author":"Poongodi M.","year":"2019","unstructured":"M. Poongodi, Mounir Hamdi, Ashutosh Sharma, Maode Ma, and Pradeep Kumar Singh. 2019. DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access 7 (2019), 183532\u2013183544.","journal-title":"IEEE Access"},{"key":"e_1_3_2_90_2","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/GLOCOM.2012.6503256","volume-title":"2012 IEEE Global Communications Conference (GLOBECOM)","author":"Biswas Subir","year":"2012","unstructured":"Subir Biswas, Jelena Mi\u0161i\u0107, and Vojislav Mi\u0161i\u0107. 2012. DDoS attack on WAVE-enabled VANET through synchronization. In 2012 IEEE Global Communications Conference (GLOBECOM). IEEE, 1079\u20131084."},{"issue":"2","key":"e_1_3_2_91_2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/iet-wss.2017.0029","article-title":"DDoS attacks in WSNs: Detection and countermeasures","volume":"8","author":"Abidoye Ademola P.","year":"2018","unstructured":"Ademola P. Abidoye and Ibidun C. Obagbuwa. 2018. DDoS attacks in WSNs: Detection and countermeasures. IET Wireless Sensor Systems 8, 2 (2018), 52\u201359.","journal-title":"IET Wireless Sensor Systems"},{"key":"e_1_3_2_92_2","first-page":"44","volume-title":"2020 State of the Software Supply Chain","author":"Dev IT Revolution Sonatype, Muse","year":"2020","unstructured":"IT Revolution Sonatype, Muse Dev. 2020. 2020 State of the Software Supply Chain. Technical Report. 44 pages."},{"key":"e_1_3_2_93_2","volume-title":"\u201cWannaCry\u201d Ransomware Attack Losses Could Reach $4 Billion","author":"Berr Jonathan","year":"2017","unstructured":"Jonathan Berr. May 2017. \u201cWannaCry\u201d Ransomware Attack Losses Could Reach $4 Billion. Technical Report."},{"key":"e_1_3_2_94_2","volume-title":"Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021","author":"Morgan Steve","year":"2019","unstructured":"Steve Morgan. October 2019. Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021. Technical Report. Cybersecurity Ventures."},{"key":"e_1_3_2_95_2","volume-title":"Confirmation of a Coordinated Attack on the Ukrainian Power Grid","author":"Assante Michael J.","year":"2016","unstructured":"Michael J. Assante. January 2016. Confirmation of a Coordinated Attack on the Ukrainian Power Grid. Technical Report."},{"key":"e_1_3_2_96_2","volume-title":"Inside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid","author":"Zetter Kim","year":"2016","unstructured":"Kim Zetter. March 2016. Inside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid. Technical Report."},{"key":"e_1_3_2_97_2","volume-title":"KillDisk and BlackEnergy Are Not Just Energy Sector Threats","author":"Wilhoit Kyle","year":"2016","unstructured":"Kyle Wilhoit. February 2016. KillDisk and BlackEnergy Are Not Just Energy Sector Threats. Technical Report. Trend Micro."},{"key":"e_1_3_2_98_2","volume-title":"Stuxnet Worm Attack on Iranian Nuclear Facilities","author":"Holloway Michael","year":"2015","unstructured":"Michael Holloway. July 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Technical Report."},{"key":"e_1_3_2_99_2","first-page":"18","volume-title":"Stuxnet - Infecting Industrial Control Systems","author":"O\u2019Murchu Liam","year":"2010","unstructured":"Liam O\u2019Murchu. September 2010. Stuxnet - Infecting Industrial Control Systems. Technical Report. 18 pages."},{"key":"e_1_3_2_100_2","volume-title":"The Real Story of Stuxnet","author":"Kushner David","year":"2013","unstructured":"David Kushner. February 2013. The Real Story of Stuxnet. Technical Report."},{"key":"e_1_3_2_101_2","volume-title":"Israeli Test on Worm Called Crucial in Iran Nuclear Delay","author":"Broad William J.","year":"2011","unstructured":"William J. Broad, John Markoff, and David E. Sanger. January 2011. Israeli Test on Worm Called Crucial in Iran Nuclear Delay. Technical Report."},{"key":"e_1_3_2_102_2","first-page":"1","article-title":"Duqu: A Stuxnet-like malware found in the wild","volume":"14","author":"Bencs\u00e1th Boldizs\u00e1r","year":"2011","unstructured":"Boldizs\u00e1r Bencs\u00e1th, G\u00e1bor P\u00e9k, Levente Butty\u00e1n, and M\u00e1rk F\u00e9legyh\u00e1zi. 2011. Duqu: A Stuxnet-like malware found in the wild. CrySyS Lab Technical Report 14 (2011), 1\u201360.","journal-title":"CrySyS Lab Technical Report"},{"key":"e_1_3_2_103_2","volume-title":"Sons of Stuxnet","author":"Cherry Steven","year":"2011","unstructured":"Steven Cherry. December 2011. Sons of Stuxnet. Technical Report."},{"key":"e_1_3_2_104_2","volume-title":"5th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Workshop on Large-Scale Exploits and Emergent Threats ( \\(\\lbrace\\) LEET \\(\\rbrace\\) 12)","author":"Chien Eric","year":"2012","unstructured":"Eric Chien, Liam OMurchu, and Nicolas Falliere. 2012. W32. Duqu: The precursor to the next Stuxnet. In 5th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Workshop on Large-Scale Exploits and Emergent Threats ( \\(\\lbrace\\) LEET \\(\\rbrace\\) 12)."},{"key":"e_1_3_2_105_2","volume-title":"ICS Advisory (ICSA-14-178-01)","year":"2018","unstructured":"August 2018. ICS Advisory (ICSA-14-178-01). Technical Report."},{"key":"e_1_3_2_106_2","volume-title":"Triton Malware Spearheads Latest Attacks on Industrial Systems","author":"Roccia Thomas","year":"2018","unstructured":"Thomas Roccia. November 2018. Triton Malware Spearheads Latest Attacks on Industrial Systems. Technical Report. McAfee."},{"key":"e_1_3_2_107_2","volume-title":"The Inside Story of the World\u2019s Most Dangerous Malware","author":"Sobczak Blake","year":"2019","unstructured":"Blake Sobczak. March 2019. The Inside Story of the World\u2019s Most Dangerous Malware. Technical Report."},{"key":"e_1_3_2_108_2","volume-title":"Shamoon 3 Targets Oil and Gas Organization","author":"Falcone Robert","year":"2018","unstructured":"Robert Falcone. December 2018. Shamoon 3 Targets Oil and Gas Organization. Technical Report. Palo Alto Networks."},{"key":"e_1_3_2_109_2","first-page":"119","volume-title":"2020 Data Breach Investigations Report","year":"2021","unstructured":"2021. 2020 Data Breach Investigations Report. Technical Report. Verizon. 119 pages."},{"issue":"10","key":"e_1_3_2_110_2","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MC.2013.69","article-title":"Critical control system protection in the 21st century","volume":"46","author":"Alcaraz Cristina","year":"2013","unstructured":"Cristina Alcaraz and Sherali Zeadally. 2013. Critical control system protection in the 21st century. Computer 46, 10 (2013), 74\u201383.","journal-title":"Computer"},{"issue":"4","key":"e_1_3_2_111_2","first-page":"122","article-title":"Analysis of cyber-attacks in IoT-based critical infrastructures","volume":"8","author":"Das Resul","year":"2020","unstructured":"Resul Das and Muhammet Zekeriya G\u00fcnd\u00fcz. 2020. Analysis of cyber-attacks in IoT-based critical infrastructures. International Journal of Information Security Science 8, 4 (2020), 122\u2013133.","journal-title":"International Journal of Information Security Science"},{"issue":"4","key":"e_1_3_2_112_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.ijcip.2009.10.001","article-title":"An experimental investigation of malware attacks on SCADA systems","volume":"2","author":"Fovino Igor Nai","year":"2009","unstructured":"Igor Nai Fovino, Andrea Carcano, Marcelo Masera, and Alberto Trombetta. 2009. An experimental investigation of malware attacks on SCADA systems. International Journal of Critical Infrastructure Protection 2, 4 (2009), 139\u2013145.","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"82","key":"e_1_3_2_113_2","first-page":"1","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"Stouffer Keith","year":"2011","unstructured":"Keith Stouffer, Joe Falco, and Karen Scarfone. 2011. Guide to industrial control systems (ICS) security. NIST Special Publication 800, 82 (2011), 1\u2013156.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_114_2","first-page":"599","volume-title":"International Conference on Human-Computer Interaction","author":"Mehrfeld Jens","year":"2020","unstructured":"Jens Mehrfeld. 2020. Cyber security threats and incidents in industrial control systems. In International Conference on Human-Computer Interaction. Springer, 599\u2013608."},{"key":"e_1_3_2_115_2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1145\/3457388.3458868","volume-title":"Proceedings of the 18th ACM International Conference on Computing Frontiers","author":"Mekdad Yassine","year":"2021","unstructured":"Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, and Abdeslam El Fergougui. 2021. A threat model method for ICS malware: The TRISIS case. In Proceedings of the 18th ACM International Conference on Computing Frontiers. ACM, 221\u2013228."},{"key":"e_1_3_2_116_2","volume-title":"Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro","author":"Alessandro Di Pinto","year":"2019","unstructured":"Di Pinto Alessandro and MacKenzie Heather. March 2019. Breaking Research: LockerGoga Ransomware Impacts Norsk Hydro. Technical Report."},{"key":"e_1_3_2_117_2","volume-title":"SYNful Knock - A Cisco Router Implant - Part I","author":"Bill Hau","year":"2015","unstructured":"Hau Bill, Lee Tony, and Homan Josh. September 2015. SYNful Knock - A Cisco Router Implant - Part I. Technical Report. Issue Advanced Malware."},{"issue":"13","key":"e_1_3_2_118_2","doi-asserted-by":"crossref","first-page":"2763","DOI":"10.3390\/app9132763","article-title":"VPNFilter malware analysis on cyber threat in smart home network","volume":"9","author":"Sicato Jose Costa Sapalo","year":"2019","unstructured":"Jose Costa Sapalo Sicato, Pradip Kumar Sharma, Vincenzo Loia, and Jong Hyuk Park. 2019. VPNFilter malware analysis on cyber threat in smart home network. Applied Sciences 9, 13 (2019), 2763.","journal-title":"Applied Sciences"},{"key":"e_1_3_2_119_2","volume-title":"How to Spot VPNFilter Malware Before It Destroys Your Router","author":"Phillips Gavin","year":"2018","unstructured":"Gavin Phillips. September 2018. How to Spot VPNFilter Malware Before It Destroys Your Router. Technical Report."},{"key":"e_1_3_2_120_2","first-page":"70","volume-title":"Cyber Threat Intelligence for Navigating the New Business Reality","author":"Terry He","year":"2021","unstructured":"He Terry, Aronce Rhoda-Mae, Dampanaboina Lalith, Jose Justin, King Michael, and Cohen Edward. 2021. Cyber Threat Intelligence for Navigating the New Business Reality. Technical Report. 70 pages."},{"key":"e_1_3_2_121_2","first-page":"39","volume-title":"2022 Mid year Update. Cyber Threat Intelligence for Navigating the Unknowns of Tomorrow","year":"2022","unstructured":"2022. 2022 Mid year Update. Cyber Threat Intelligence for Navigating the Unknowns of Tomorrow. Technical Report. 39 pages."},{"key":"e_1_3_2_122_2","volume-title":"Ransomware Statistics in 2022: From Random Barrages to Targeted Hits","author":"Vojinovic Ivana","year":"2022","unstructured":"Ivana Vojinovic. October 2022. Ransomware Statistics in 2022: From Random Barrages to Targeted Hits. Technical Report."},{"key":"e_1_3_2_123_2","first-page":"3","volume-title":"Updates Relating to COVID-19, IT Security Incident, Outlook and Ordinary Dividend","author":"Terry He","year":"2021","unstructured":"He Terry, Aronce Rhoda-Mae, Dampanaboina Lalith, Jose Justin, King Michael, and Cohen Edward. 2021. Updates Relating to COVID-19, IT Security Incident, Outlook and Ordinary Dividend. Technical Report. 3 pages."},{"key":"e_1_3_2_124_2","volume-title":"Emotet Botnet Disrupted in International Cyber Operation","author":"Affairs Office of Public","year":"2021","unstructured":"Office of Public Affairs. January 2021. Emotet Botnet Disrupted in International Cyber Operation. Technical Report."},{"issue":"2","key":"e_1_3_2_125_2","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCE.2018.2881291","article-title":"Mobile banking: Evolution and threats: Malware threats and security solutions","volume":"8","author":"Wazid Mohammad","year":"2019","unstructured":"Mohammad Wazid, Sherali Zeadally, and Ashok Kumar Das. 2019. Mobile banking: Evolution and threats: Malware threats and security solutions. IEEE Consumer Electronics Magazine 8, 2 (2019), 56\u201360.","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"e_1_3_2_126_2","volume-title":"15 (CRAZY) Malware and Virus Statistics, Trends & Facts","author":"Sanders Andrew","year":"2021","unstructured":"Andrew Sanders. January 2021. 15 (CRAZY) Malware and Virus Statistics, Trends & Facts. Technical Report."},{"key":"e_1_3_2_127_2","first-page":"46","volume-title":"Mobile Ad Fraud & Malware, Report 2021. A Pandemic on Mobile","year":"2021","unstructured":"2021. Mobile Ad Fraud & Malware, Report 2021. A Pandemic on Mobile. Technical Report. Secure-D Upstream. 46 pages."},{"key":"e_1_3_2_128_2","volume-title":"Mobile Malware Evolution 2020","author":"Chebyshev Victor","year":"2021","unstructured":"Victor Chebyshev. March 2021. Mobile Malware Evolution 2020. Technical Report."},{"key":"e_1_3_2_129_2","first-page":"49","volume-title":"Securing the Digital Economy, Reinventing the Internet for Trust","author":"Omar Abbosh","year":"2019","unstructured":"Abbosh Omar and Bissell Kelly. 2019. Securing the Digital Economy, Reinventing the Internet for Trust. Technical Report. 49 pages."},{"key":"e_1_3_2_130_2","first-page":"50","volume-title":"X-Force Threat Intelligence Index 2021","author":"Singleton Camille","year":"2021","unstructured":"Camille Singleton. February 2021. X-Force Threat Intelligence Index 2021. Technical Report. 50 pages."},{"key":"e_1_3_2_131_2","volume-title":"The State of Ransomware in the US: Report and Statistics 2019","author":"Phillips Gavin","year":"2019","unstructured":"Gavin Phillips. December 2019. The State of Ransomware in the US: Report and Statistics 2019. Technical Report."},{"issue":"3","key":"e_1_3_2_132_2","article-title":"Hard-coded credentials and web service in IoT: Issues and challenges","volume":"2","author":"Verma Rajat Singh","year":"2019","unstructured":"Rajat Singh Verma and B. R. Chandavarkar. 2019. Hard-coded credentials and web service in IoT: Issues and challenges. International Journal of Computational Intelligence & IoT, Forthcoming 2, 3 (2019).","journal-title":"International Journal of Computational Intelligence & IoT, Forthcoming"},{"key":"e_1_3_2_133_2","doi-asserted-by":"crossref","first-page":"00813","DOI":"10.1109\/ISCC.2018.8538636","volume-title":"2018 IEEE Symposium on Computers and Communications (ISCC)","author":"Marzano Artur","year":"2018","unstructured":"Artur Marzano, David Alexander, Osvaldo Fonseca, Elverton Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves, \u00cdtalo Cunha, Dorgival Guedes, and Wagner Meira. 2018. The evolution of Bashlite and Mirai IoT botnets. In 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 00813\u201300818."},{"issue":"2","key":"e_1_3_2_134_2","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.1109\/COMST.2020.2976075","article-title":"Realizing an internet of secure things: A survey on issues and enabling technologies","volume":"22","author":"Hamad Salma Abdalla","year":"2020","unstructured":"Salma Abdalla Hamad, Quan Z. Sheng, Wei Emma Zhang, and Surya Nepal. 2020. Realizing an internet of secure things: A survey on issues and enabling technologies. IEEE Communications Surveys & Tutorials 22, 2 (2020), 1372\u20131391.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_135_2","first-page":"1093","volume-title":"26th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 17)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, et\u00a0al. 2017. Understanding the Mirai botnet. In 26th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 17). 1093\u20131110."},{"issue":"7","key":"e_1_3_2_136_2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and other botnets","volume":"50","author":"Kolias Constantinos","year":"2017","unstructured":"Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. Computer 50, 7 (2017), 80\u201384.","journal-title":"Computer"},{"key":"e_1_3_2_137_2","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/MILCOM.2017.8170867","volume-title":"MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM)","author":"Kambourakis Georgios","year":"2017","unstructured":"Georgios Kambourakis, Constantinos Kolias, and Angelos Stavrou. 2017. The Mirai botnet and the IoT zombie armies. In MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM). IEEE, 267\u2013272."},{"key":"e_1_3_2_138_2","doi-asserted-by":"crossref","first-page":"172","DOI":"10.23919\/ICACT.2018.8323686","volume-title":"2018 20th International Conference on Advanced Communication Technology (ICACT)","author":"Seralathan Yogeesh","year":"2018","unstructured":"Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, and Jeong Neyo Kim. 2018. IoT security vulnerability: A case study of a web camera. In 2018 20th International Conference on Advanced Communication Technology (ICACT). IEEE, 172\u2013177."},{"key":"e_1_3_2_139_2","volume-title":"Worst Passwords of 2018","year":"2020","unstructured":"June 2020. Worst Passwords of 2018. Technical Report. Security TeamsID."},{"key":"e_1_3_2_140_2","volume-title":"Better Check This List: Worst Passwords of 2018","author":"Rentz Pamela","year":"2019","unstructured":"Pamela Rentz. January 2019. Better Check This List: Worst Passwords of 2018. Technical Report. Techwell."},{"issue":"11","key":"e_1_3_2_141_2","doi-asserted-by":"crossref","first-page":"3048","DOI":"10.3390\/s20113048","article-title":"Teaching and learning IoT cybersecurity and vulnerability assessment with Shodan through practical use cases","volume":"20","author":"Fern\u00e1ndez-Caram\u00e9s Tiago M.","year":"2020","unstructured":"Tiago M. Fern\u00e1ndez-Caram\u00e9s and Paula Fraga-Lamas. 2020. Teaching and learning IoT cybersecurity and vulnerability assessment with Shodan through practical use cases. Sensors 20, 11 (2020), 3048.","journal-title":"Sensors"},{"issue":"15","key":"e_1_3_2_142_2","doi-asserted-by":"crossref","first-page":"2696","DOI":"10.1002\/sec.1262","article-title":"ShoVAT: Shodan-based vulnerability assessment tool for internet-facing services","volume":"9","author":"Genge B\u00e9la","year":"2016","unstructured":"B\u00e9la Genge and C\u0103lin En\u0103chescu. 2016. ShoVAT: Shodan-based vulnerability assessment tool for internet-facing services. Security and Communication Networks 9, 15 (2016), 2696\u20132714.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_143_2","first-page":"1","article-title":"Complete guide to Shodan","volume":"1","author":"Matherly John","year":"2016","unstructured":"John Matherly. 2016. Complete guide to Shodan. Shodan, LLC 1 (2016), 1\u201370.","journal-title":"Shodan, LLC"},{"key":"e_1_3_2_144_2","first-page":"1","volume-title":"2019 IEEE 20th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","author":"Albataineh Areej","year":"2019","unstructured":"Areej Albataineh and Izzat Alsmadi. 2019. IoT and the risk of internet exposure: Risk assessment using Shodan queries. In 2019 IEEE 20th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 1\u20135."},{"key":"e_1_3_2_145_2","first-page":"1","volume-title":"Remote Exploitation of the NeoCoolcam IP Cameras and Gateway","year":"2015","unstructured":"Bitdefender. 2015. Remote Exploitation of the NeoCoolcam IP Cameras and Gateway. Technical Report. Bitdefender. 1\u20138."},{"key":"e_1_3_2_146_2","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/PERCOMW.2018.8480184","volume-title":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","author":"Bugeja Joseph","year":"2018","unstructured":"Joseph Bugeja, D\u00e9sir\u00e9e J\u00f6nsson, and Andreas Jacobsson. 2018. An investigation of vulnerabilities in smart connected cameras. In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 537\u2013542."},{"key":"e_1_3_2_147_2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1145\/2663716.2663755","volume-title":"Proceedings of the 2014 Conference on Internet Measurement Conference","author":"Durumeric Zakir","year":"2014","unstructured":"Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson, Michael Bailey, et\u00a0al. 2014. The matter of Heartbleed. In Proceedings of the 2014 Conference on Internet Measurement Conference. 475\u2013488."},{"issue":"4","key":"e_1_3_2_148_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MSP.2014.66","article-title":"Heartbleed 101","volume":"12","author":"Carvalho Marco","year":"2014","unstructured":"Marco Carvalho, Jared DeMott, Richard Ford, and David A. Wheeler. 2014. Heartbleed 101. IEEE Security & Privacy 12, 4 (2014), 63\u201367.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_149_2","doi-asserted-by":"crossref","first-page":"102209","DOI":"10.1016\/j.cose.2021.102209","article-title":"A blockchain-based certificate revocation management and status verification system","volume":"104","author":"Adja Yves Christian Elloh","year":"2021","unstructured":"Yves Christian Elloh Adja, Badis Hammi, Ahmed Serhrouchni, and Sherali Zeadally. 2021. A blockchain-based certificate revocation management and status verification system. Computers & Security 104 (2021), 102209.","journal-title":"Computers & Security"},{"key":"e_1_3_2_150_2","volume-title":"Certificate Revocation: Why Browsers Remain Affected by Heartbleed","author":"Mutton Paul","year":"2014","unstructured":"Paul Mutton. April 2014. Certificate Revocation: Why Browsers Remain Affected by Heartbleed. Technical Report. Netcraft."},{"key":"e_1_3_2_151_2","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1109\/Trustcom.2015.493","volume-title":"2015 IEEE Trustcom\/BigDataSE\/ISPA","author":"Delamore Baden","year":"2015","unstructured":"Baden Delamore and Ryan K. L. Ko. 2015. A global, empirical analysis of the shellshock vulnerability in web applications. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1. IEEE, 1129\u20131135."},{"issue":"2","key":"e_1_3_2_152_2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/00396338.2021.1906001","article-title":"Lessons of the solarwinds hack","volume":"63","author":"Willett Marcus","year":"2021","unstructured":"Marcus Willett. 2021. Lessons of the solarwinds hack. Survival 63, 2 (2021), 7\u201326.","journal-title":"Survival"},{"key":"e_1_3_2_153_2","article-title":"SolarWinds hack will alter US cyber strategy","author":"Analytica Oxford","unstructured":"Oxford Analytica. ([n. d.]). SolarWinds hack will alter US cyber strategy. Emerald Expert Briefings oxan-db ([n. d.]).","journal-title":"Emerald Expert Briefings"},{"key":"e_1_3_2_154_2","article-title":"Fallout of SolarWinds hack could last for years","author":"Analytica Oxford","year":"2020","unstructured":"Oxford Analytica. 2020. Fallout of SolarWinds hack could last for years. Emerald Expert Briefingsoxan-es (2020).","journal-title":"Emerald Expert Briefings"},{"key":"e_1_3_2_155_2","volume-title":"Defining Insider Threats","year":"2021","unstructured":"April 2021. Defining Insider Threats. Technical Report."},{"issue":"4","key":"e_1_3_2_156_2","first-page":"183","article-title":"Detecting insider threats: Solutions and trends","volume":"21","author":"Zeadally Sherali","year":"2012","unstructured":"Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong, and Lily Liang. 2012. Detecting insider threats: Solutions and trends. Information Security Journal: A Global Perspective 21, 4 (2012), 183\u2013192.","journal-title":"Information Security Journal: A Global Perspective"},{"key":"e_1_3_2_157_2","first-page":"18","volume-title":"Insider Threat. ENISA Threat Landscape","year":"2020","unstructured":"2020. Insider Threat. ENISA Threat Landscape. Technical Report. European Union Agency for Cybersecurity (ENISA). 18 pages."},{"key":"e_1_3_2_158_2","first-page":"66","volume-title":"2021 Cyberthreat Defense Report","year":"2021","unstructured":"2021. 2021 Cyberthreat Defense Report. Technical Report. CyberEdge Group. 66 pages."},{"key":"e_1_3_2_159_2","first-page":"24","volume-title":"Webroot Threat Report","year":"2020","unstructured":"2020. Webroot Threat Report. Technical Report. Webroot. 24 pages."},{"key":"e_1_3_2_160_2","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1109\/SP.2019.00013","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Alrawi Omar","year":"2019","unstructured":"Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. SoK: Security evaluation of home-based IoT deployments. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1362\u20131380."},{"key":"e_1_3_2_161_2","volume-title":"Better Practices for IoT Smart Home Security","author":"Wells Jonathan","year":"2020","unstructured":"Jonathan Wells. 2020. Better Practices for IoT Smart Home Security. Ph.D. Dissertation. Utica College."},{"key":"e_1_3_2_162_2","first-page":"65","article-title":"Social engineering and crime prevention in cyberspace","author":"Chantler Nic","year":"2008","unstructured":"Nic Chantler and Roderic Broadhurst. 2008. Social engineering and crime prevention in cyberspace. Proceedings of the Korean Institute of Criminology (2008), 65\u201392.","journal-title":"Proceedings of the Korean Institute of Criminology"},{"key":"e_1_3_2_163_2","first-page":"30","volume-title":"Internet Crime Report 2020","year":"2021","unstructured":"2021. Internet Crime Report 2020. Technical Report. Federal Bureau of Investigation (FBI). 30 pages."},{"key":"e_1_3_2_164_2","first-page":"14","volume-title":"Phishing Activity Trends Report, Fourth Quarter 2020","year":"2021","unstructured":"February 2021. Phishing Activity Trends Report, Fourth Quarter 2020. Technical Report. APWG. 14 pages."},{"key":"e_1_3_2_165_2","first-page":"36","volume-title":"Is Cybersecurity About More than Protection? EY Global Information Security Survey 2018\u201319","year":"2018","unstructured":"2018. Is Cybersecurity About More than Protection? EY Global Information Security Survey 2018\u201319. Technical Report. EY Global. 36 pages."},{"key":"e_1_3_2_166_2","first-page":"1","volume-title":"Supply Chain Risk Management Practices for Federal Information Systems and Organizations","author":"Boyens Jon","year":"2015","unstructured":"Jon Boyens, Celia Paulsen, Rama Moorthy, and Nadya Bartol. 2015. Supply Chain Risk Management Practices for Federal Information Systems and Organizations. Technical Report. National Institute of Standards and Technology (NIST). 1\u2013282."},{"key":"e_1_3_2_167_2","unstructured":"I. Bryant. 2013. International perspectives on SCRM presented at the Eighteenth Semi-Annual Software Assurance Forum 2013."},{"key":"e_1_3_2_168_2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420013283","volume-title":"Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI","author":"Herrmann Debra S.","year":"2007","unstructured":"Debra S. Herrmann. 2007. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI. CRC Press. 848 pages."},{"key":"e_1_3_2_169_2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420031492","volume-title":"A Practical Guide to Security Engineering and Information Assurance","author":"Herrmann Debra S.","year":"2001","unstructured":"Debra S. Herrmann. 2001. A Practical Guide to Security Engineering and Information Assurance. CRC Press."},{"key":"e_1_3_2_170_2","unstructured":"Debra S. Herrmann. 2000. Software safety and reliability. Institute of Electrical & Electronics Engineers."},{"issue":"2","key":"e_1_3_2_171_2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.ijcip.2010.06.003","article-title":"The SEMA referential framework: Avoiding ambiguities in the terms \u201csecurity\u201d and \u2018safety\u201d","volume":"3","author":"Pi\u00e8tre-Cambac\u00e9d\u00e8s Ludovic","year":"2010","unstructured":"Ludovic Pi\u00e8tre-Cambac\u00e9d\u00e8s and Claude Chaudet. 2010. The SEMA referential framework: Avoiding ambiguities in the terms \u201csecurity\u201d and \u2018safety\u201d. International Journal of Critical Infrastructure Protection 3, 2 (2010), 55\u201366.","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"e_1_3_2_172_2","first-page":"1","volume-title":"IT Supply Chain. National Security-Related Agencies Need to Better Address Risks","year":"2012","unstructured":"March 2012. IT Supply Chain. National Security-Related Agencies Need to Better Address Risks. Technical Report. 1\u201345."},{"key":"e_1_3_2_173_2","volume-title":"Remarks by the President on Securing Our Nation\u2019s Cyber Infrastructure","author":"Barack Obama","year":"2009","unstructured":"Obama Barack. May 2009. Remarks by the President on Securing Our Nation\u2019s Cyber Infrastructure. Technical Report."},{"key":"e_1_3_2_174_2","volume-title":"Securing Cyberspace: International and Asian Perspectives","author":"Samuel Cherian","year":"2016","unstructured":"Cherian Samuel and Munish Sharma. 2016. Securing Cyberspace: International and Asian Perspectives. Institute for Defence Studies and Analyses."},{"issue":"34","key":"e_1_3_2_175_2","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.technovation.2014.02.004","article-title":"Security in the cyber supply chain: A Chinese perspective","volume":"7","author":"Rongping Mu","year":"2014","unstructured":"Mu Rongping and Fan Yonggang. 2014. Security in the cyber supply chain: A Chinese perspective. Technovation 7, 34 (2014), 385\u2013386.","journal-title":"Technovation"},{"key":"e_1_3_2_176_2","first-page":"1","article-title":"Cyber supply chain risk management: Toward a global vision of transparency and trust","author":"Charney Scott","year":"2011","unstructured":"Scott Charney, Eric T. Werner, and Trustworthy Computing. 2011. Cyber supply chain risk management: Toward a global vision of transparency and trust. Microsoft Corporation paper (2011), 1\u201319.","journal-title":"Microsoft Corporation paper"},{"key":"e_1_3_2_177_2","first-page":"1","volume-title":"The Comprehensive National Cybersecurity Initiative","year":"2008","unstructured":"2008. The Comprehensive National Cybersecurity Initiative. Technical Report. 1\u20135."},{"key":"e_1_3_2_178_2","first-page":"1","volume-title":"Security and Privacy Controls for Information Systems and Organizations","year":"2020","unstructured":"2020. Security and Privacy Controls for Information Systems and Organizations. Technical Report. National Institute of Standards and Technology (NIST). 1\u2013481."},{"key":"e_1_3_2_179_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.6028\/NIST.IR.7622","volume-title":"National Supply Chain Risk Management Practices for Federal Information Systems","author":"Boyens Jon","year":"2012","unstructured":"Jon Boyens, Nadya Bartol, Jon Boyens, Rama Moorthy, Celia Paulsen, and Stephany A. Shankles. 2012. National Supply Chain Risk Management Practices for Federal Information Systems. Technical Report. US Department of Commerce, National Institute of Standards and Technology (NIST). 1\u201399."},{"key":"e_1_3_2_180_2","first-page":"1","volume-title":"H.R.6523 - Ike Skelton National Defense Authorization Act for Fiscal Year 2011","year":"2011","unstructured":"7, January 2011. H.R.6523 - Ike Skelton National Defense Authorization Act for Fiscal Year 2011. Technical Report. 1\u2013383."},{"key":"e_1_3_2_181_2","first-page":"1","volume-title":"Consultation Paper on Encouraging Telecom Equipment Manufacturing in India","year":"2010","unstructured":"December, 2010. Consultation Paper on Encouraging Telecom Equipment Manufacturing in India. Technical Report. 1\u201355."},{"key":"e_1_3_2_182_2","article-title":"China\u2019s technology protectionism and its non-negotiable rationales","author":"Ferracane Martina F.","year":"2017","unstructured":"Martina F. Ferracane and Hosuk Lee-Makiyama. 2017. China\u2019s technology protectionism and its non-negotiable rationales. Brussels: European Centre for International Political Economy (2017).","journal-title":"Brussels: European Centre for International Political Economy"},{"key":"e_1_3_2_183_2","first-page":"1","volume-title":"Technology Security and IT in China: Benchmarking and Best Practices","year":"2016","unstructured":"July 2016. Technology Security and IT in China: Benchmarking and Best Practices. Technical Report. 1\u201318."},{"issue":"7","key":"e_1_3_2_184_2","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.technovation.2014.01.004","article-title":"Supply chain cyber security: A Russian outlook","volume":"34","author":"Sokolov Alexander","year":"2014","unstructured":"Alexander Sokolov, Vladimir Mesropyan, and Alexander Chulok. 2014. Supply chain cyber security: A Russian outlook. Technovation 34, 7 (2014), 389\u2013391.","journal-title":"Technovation"},{"issue":"4","key":"e_1_3_2_185_2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MSP.2015.72","article-title":"A socio-technical framework for threat modeling a software supply chain","volume":"13","author":"Sabbagh Bilal Al","year":"2015","unstructured":"Bilal Al Sabbagh and Stewart Kowalski. 2015. A socio-technical framework for threat modeling a software supply chain. IEEE Security & Privacy 13, 4 (2015), 30\u201339.","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"e_1_3_2_186_2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3390\/fi11030063","article-title":"Cyber security threat modeling for supply chain organizational environments","volume":"11","author":"Yeboah-Ofori Abel","year":"2019","unstructured":"Abel Yeboah-Ofori and Shareeful Islam. 2019. Cyber security threat modeling for supply chain organizational environments. Future Internet 11, 3 (2019), 63.","journal-title":"Future Internet"},{"issue":"8","key":"e_1_3_2_187_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2019.1900120","article-title":"Supply chain of things: A connected solution to enhance supply chain productivity","volume":"57","author":"Wu Chung Kit","year":"2019","unstructured":"Chung Kit Wu, Kim Fung Tsang, Yucheng Liu, Hongxu Zhu, Yang Wei, Hao Wang, and Tsz Tat Yu. 2019. Supply chain of things: A connected solution to enhance supply chain productivity. IEEE Communications Magazine 57, 8 (2019), 78\u201383.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_188_2","first-page":"1","volume-title":"Software Integrity Controls\u2013an Assurance-based Approach to Minimizing Risks in the Software Supply Chain","author":"Simpson Stacy","year":"2010","unstructured":"Stacy Simpson, Diego Baldini, Gunter Bitz, David Dillard, Chris Fagan, Brad Minnis, and Dan Reddy. June 2010. Software Integrity Controls\u2013an Assurance-based Approach to Minimizing Risks in the Software Supply Chain. Technical Report. Software Assurance Forum for Excellence in Code (SAFECode). 1\u201326."},{"key":"e_1_3_2_189_2","first-page":"1","volume-title":"2011 44th Hawaii International Conference on System Sciences","author":"Alberts Christopher J.","year":"2011","unstructured":"Christopher J. Alberts, Audrey J. Dorofee, Rita Creel, Robert J. Ellison, and Carol Woody. 2011. A systemic approach for assessing software supply-chain risk. In 2011 44th Hawaii International Conference on System Sciences. IEEE, 1\u20138."},{"key":"e_1_3_2_190_2","first-page":"1","article-title":"Toward a trusted supply chain: A risk based approach to managing software integrity","author":"Storch Tyson","year":"2014","unstructured":"Tyson Storch. 2014. Toward a trusted supply chain: A risk based approach to managing software integrity. Trustworthy Computing Microsoft Corporation (2014), 1\u201325.","journal-title":"Trustworthy Computing Microsoft Corporation"},{"key":"e_1_3_2_191_2","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1109\/IAdCC.2013.6514473","volume-title":"2013 3rd IEEE International Advance Computing Conference (IACC)","author":"Bhargava Bharat","year":"2013","unstructured":"Bharat Bhargava, Rohit Ranchal, and Lotfi Ben Othmane. 2013. Secure information sharing in digital supply chains. In 2013 3rd IEEE International Advance Computing Conference (IACC). IEEE, 1636\u20131640."},{"issue":"1","key":"e_1_3_2_192_2","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/TETC.2015.2389532","article-title":"DTD: A novel double-track approach to clone detection for RFID-enabled supply chains","volume":"5","author":"Huang Jun","year":"2015","unstructured":"Jun Huang, Xiang Li, Cong-Cong Xing, Wei Wang, Kun Hua, and Song Guo. 2015. DTD: A novel double-track approach to clone detection for RFID-enabled supply chains. IEEE Transactions on Emerging Topics in Computing 5, 1 (2015), 134\u2013140.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"8","key":"e_1_3_2_193_2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MC.2016.224","article-title":"Supply-chain security of digital microfluidic biochips","volume":"49","author":"Ali Sk Subidh","year":"2016","unstructured":"Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, and Krishnendu Chakrabarty. 2016. Supply-chain security of digital microfluidic biochips. Computer 49, 8 (2016), 36\u201343.","journal-title":"Computer"},{"issue":"8","key":"e_1_3_2_194_2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2016.243","article-title":"A platform solution for secure supply-chain and chip life-cycle management","volume":"49","author":"Skudlarek Joseph P.","year":"2016","unstructured":"Joseph P. Skudlarek, Tom Katsioulas, and Michael Chen. 2016. A platform solution for secure supply-chain and chip life-cycle management. Computer 49, 8 (2016), 28\u201334.","journal-title":"Computer"},{"issue":"11","key":"e_1_3_2_195_2","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1109\/TVLSI.2018.2850807","article-title":"An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies","volume":"26","author":"Zhang Dongrong","year":"2018","unstructured":"Dongrong Zhang, Xiaoxiao Wang, Md. Tauhidur Rahman, and Mark Tehranipoor. 2018. An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, 11 (2018), 2456\u20132469.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"e_1_3_2_196_2","doi-asserted-by":"crossref","first-page":"58981","DOI":"10.1109\/ACCESS.2019.2914454","article-title":"An efficient web authentication mechanism preventing man-in-the-middle attacks in industry 4.0 supply chain","volume":"7","author":"Esfahani Alireza","year":"2019","unstructured":"Alireza Esfahani, Georgios Mantas, Jose Ribeiro, Joaquim Bastos, Shahid Mumtaz, Manuel A. Violas, A. Manuel De Oliveira Duarte, and Jonathan Rodriguez. 2019. An efficient web authentication mechanism preventing man-in-the-middle attacks in industry 4.0 supply chain. IEEE Access 7 (2019), 58981\u201358989.","journal-title":"IEEE Access"},{"key":"e_1_3_2_197_2","doi-asserted-by":"crossref","first-page":"772","DOI":"10.23919\/INM.2017.7987376","volume-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"Bocek Thomas","year":"2017","unstructured":"Thomas Bocek, Bruno B. Rodrigues, Tim Strasser, and Burkhard Stiller. 2017. Blockchains everywhere-a use-case of blockchains in the pharma supply-chain. In 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 772\u2013777."},{"issue":"4","key":"e_1_3_2_198_2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3390\/info8040137","article-title":"A distributed ledger for supply chain physical distribution visibility","volume":"8","author":"Wu Haoyan","year":"2017","unstructured":"Haoyan Wu, Zhijie Li, Brian King, Zina Ben Miled, John Wassick, and Jeffrey Tazelaar. 2017. A distributed ledger for supply chain physical distribution visibility. Information 8, 4 (2017), 137.","journal-title":"Information"},{"issue":"15","key":"e_1_3_2_199_2","doi-asserted-by":"crossref","first-page":"4955","DOI":"10.3390\/s21154955","article-title":"Interoperable blockchains for highly-integrated supply chains in collaborative manufacturing","volume":"21","author":"Bellavista Paolo","year":"2021","unstructured":"Paolo Bellavista, Christian Esposito, Luca Foschini, Carlo Giannelli, Nicola Mazzocca, and Rebecca Montanari. 2021. Interoperable blockchains for highly-integrated supply chains in collaborative manufacturing. Sensors 21, 15 (2021), 4955.","journal-title":"Sensors"},{"key":"e_1_3_2_200_2","first-page":"1","volume-title":"2018 IEEE International Symposium on Technologies for Homeland Security (HST)","author":"Xu Lei","year":"2018","unstructured":"Lei Xu, Lin Chen, Zhimin Gao, Yanling Chang, Eleftherios Iakovou, and Weidong Shi. 2018. Binding the physical and cyber worlds: A blockchain approach for cargo supply chain security enhancement. In 2018 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, 1\u20135."},{"key":"e_1_3_2_201_2","first-page":"1","volume-title":"MediLedger 2018 Progress Report","year":"2018","unstructured":"2018. MediLedger 2018 Progress Report. Technical Report. 1\u201314."},{"key":"e_1_3_2_202_2","unstructured":"2018. TradeLens Documentation. (2018). https:\/\/docs.tradelens.com\/.Accessed:2021-08-06."},{"issue":"9","key":"e_1_3_2_203_2","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.3390\/s18093133","article-title":"A blockchain implementation prototype for the electronic open source traceability of wood along the whole supply chain","volume":"18","author":"Figorilli Simone","year":"2018","unstructured":"Simone Figorilli, Francesca Antonucci, Corrado Costa, Federico Pallottino, Luciano Raso, Marco Castiglione, Edoardo Pinci, Davide Del Vecchio, Giacomo Colle, Andrea Rosario Proto, et\u00a0al. 2018. A blockchain implementation prototype for the electronic open source traceability of wood along the whole supply chain. Sensors 18, 9 (2018), 3133.","journal-title":"Sensors"},{"key":"e_1_3_2_204_2","doi-asserted-by":"crossref","first-page":"17465","DOI":"10.1109\/ACCESS.2017.2720760","article-title":"A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain","volume":"5","author":"Toyoda Kentaroh","year":"2017","unstructured":"Kentaroh Toyoda, P. Takis Mathiopoulos, Iwao Sasase, and Tomoaki Ohtsuki. 2017. A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain. IEEE Access 5 (2017), 17465\u201317477.","journal-title":"IEEE Access"},{"key":"e_1_3_2_205_2","first-page":"1","volume-title":"2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany)","author":"Caro Miguel Pincheira","year":"2018","unstructured":"Miguel Pincheira Caro, Muhammad Salek Ali, Massimo Vecchio, and Raffaele Giaffreda. 2018. Blockchain-based traceability in agri-food supply chain management: A practical implementation. In 2018 IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT Tuscany). IEEE, 1\u20134."},{"key":"e_1_3_2_206_2","first-page":"1","volume-title":"Waltonchain White Paper (V 1.0.4)","year":"2018","unstructured":"February 2018. Waltonchain White Paper (V 1.0.4). Technical Report. 1\u201368."},{"key":"e_1_3_2_207_2","unstructured":"Hyperledger. 2019. How Walmart brought unprecedented transparency to the food supply chain with hyperledger fabric. (2019) 7."},{"key":"e_1_3_2_208_2","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/Blockchain.2019.00032","volume-title":"2019 IEEE International Conference on Blockchain (Blockchain)","author":"Malik Sidra","year":"2019","unstructured":"Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. 2019. TrustChain: Trust management in blockchain and IoT supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 184\u2013193."},{"key":"e_1_3_2_209_2","first-page":"1","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression (STIX)","volume":"11","author":"Barnum Sean","year":"2012","unstructured":"Sean Barnum. 2012. Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corporation 11 (2012), 1\u201322.","journal-title":"Mitre Corporation"},{"key":"e_1_3_2_210_2","first-page":"1","volume-title":"2010 43rd Hawaii International Conference on System Sciences","author":"Ellison Robert J.","year":"2010","unstructured":"Robert J. Ellison and Carol Woody. 2010. Supply-chain risk management: Incorporating security into software development. In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 1\u201310."},{"key":"e_1_3_2_211_2","first-page":"28","volume-title":"International Conference on Information Security and Cryptology","author":"Huth Christopher","year":"2016","unstructured":"Christopher Huth, Aydin Aysu, Jorge Guajardo, Paul Duplys, and Tim G\u00fcneysu. 2016. Secure and private, yet lightweight, authentication for the IoT via PUF and CBKA. In International Conference on Information Security and Cryptology. Springer, 28\u201348."},{"key":"e_1_3_2_212_2","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/978-3-030-22277-2_25","volume-title":"Handbook of Computer Networks and Cyber Security","author":"Tewari Aakanksha","year":"2020","unstructured":"Aakanksha Tewari and Brij B. Gupta. 2020. An analysis of provable security frameworks for RFID security. In Handbook of Computer Networks and Cyber Security. Springer, 635\u2013651."},{"key":"e_1_3_2_213_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-22277-2","volume-title":"Handbook of Computer Networks and Cyber Security","author":"Gupta Brij B.","year":"2020","unstructured":"Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, and Deepak Gupta. 2020. Handbook of Computer Networks and Cyber Security. Springer."},{"issue":"9","key":"e_1_3_2_214_2","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1109\/TCAD.2017.2772817","article-title":"Secure scan and test using obfuscation throughout supply chain","volume":"37","author":"Wang Xiaoxiao","year":"2017","unstructured":"Xiaoxiao Wang, Dongrong Zhang, Miao He, Donglin Su, and Mark Tehranipoor. 2017. Secure scan and test using obfuscation throughout supply chain. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 9 (2017), 1867\u20131880.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_3_2_215_2","first-page":"671","volume-title":"23rd \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 14)","author":"Karapanos Nikolaos","year":"2014","unstructured":"Nikolaos Karapanos and Srdjan Capkun. 2014. On the effective prevention of \\(\\lbrace\\) TLS \\(\\rbrace\\) man-in-the-middle attacks in web applications. In 23rd \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 14). 671\u2013686."},{"issue":"6","key":"e_1_3_2_216_2","doi-asserted-by":"crossref","first-page":"e130","DOI":"10.1002\/itl2.130","article-title":"Blockchain: Trends and future opportunities","volume":"2","author":"Zeadally Sherali","year":"2019","unstructured":"Sherali Zeadally and Jacques Bou Abdo. 2019. Blockchain: Trends and future opportunities. Internet Technology Letters 2, 6 (2019), e130.","journal-title":"Internet Technology Letters"},{"key":"e_1_3_2_217_2","first-page":"3","volume-title":"Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg International Conference of Logistics (HICL), Vol. 23","author":"Hackius Niels","year":"2017","unstructured":"Niels Hackius and Moritz Petersen. 2017. Blockchain in logistics and supply chain: Trick or treat?. In Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg International Conference of Logistics (HICL), Vol. 23. Berlin: epubli GmbH, 3\u201318."},{"issue":"10","key":"e_1_3_2_218_2","doi-asserted-by":"crossref","first-page":"3652","DOI":"10.3390\/su10103652","article-title":"Blockchain practices, potentials, and perspectives in greening supply chains","volume":"10","author":"Kouhizadeh Mahtab","year":"2018","unstructured":"Mahtab Kouhizadeh and Joseph Sarkis. 2018. Blockchain practices, potentials, and perspectives in greening supply chains. Sustainability 10, 10 (2018), 3652.","journal-title":"Sustainability"},{"issue":"9","key":"e_1_3_2_219_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.15623\/ijret.2016.0509001","article-title":"Blockchain ready manufacturing supply chain using distributed ledger","volume":"5","author":"Abeyratne Saveen A.","year":"2016","unstructured":"Saveen A. Abeyratne and Radmehr P. Monfared. 2016. Blockchain ready manufacturing supply chain using distributed ledger. International Journal of Research in Engineering and Technology 5, 9 (2016), 1\u201310.","journal-title":"International Journal of Research in Engineering and Technology"},{"key":"e_1_3_2_220_2","volume-title":"Proceedings of the 50th Hawaii International Conference on System Sciences","author":"Korpela Kari","year":"2017","unstructured":"Kari Korpela, Jukka Hallikas, and Tomi Dahlberg. 2017. Digital supply chain transformation toward blockchain integration. In Proceedings of the 50th Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_221_2","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1016\/j.tifs.2019.07.034","article-title":"The rise of blockchain technology in agriculture and food supply chains","volume":"91","author":"Kamilaris Andreas","year":"2019","unstructured":"Andreas Kamilaris, Agusti Fonts, and Francesc X Prenafeta-Bold \\(\\acute{\\nu }\\) . 2019. The rise of blockchain technology in agriculture and food supply chains. Trends in Food Science & Technology 91 (2019), 640\u2013652.","journal-title":"Trends in Food Science & Technology"},{"key":"e_1_3_2_222_2","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/MDM.2019.000-4","volume-title":"2019 20th IEEE International Conference on Mobile Data Management (MDM)","author":"Lam Oi Wa Amy","year":"2019","unstructured":"Oi Wa Amy Lam and LEI Zhibin. 2019. Textile and apparel supply chain with distributed ledger technology (DLT). In 2019 20th IEEE International Conference on Mobile Data Management (MDM). IEEE, 447\u2013451."},{"key":"e_1_3_2_223_2","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/ICEBE.2017.34","volume-title":"2017 IEEE 14th International Conference on e-Business Engineering (ICEBE)","author":"Chen Si","year":"2017","unstructured":"Si Chen, Rui Shi, Zhuangyu Ren, Jiaqi Yan, Yani Shi, and Jinyu Zhang. 2017. A blockchain-based supply chain quality management framework. In 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE). IEEE, 172\u2013176."},{"key":"e_1_3_2_224_2","first-page":"363","volume-title":"International Conference on Security with Intelligent Computing and Big-data Services","author":"Chang Po-Yeuan","year":"2017","unstructured":"Po-Yeuan Chang, Min-Shiang Hwang, and Chao-Chen Yang. 2017. A blockchain-based traceable certification system. In International Conference on Security with Intelligent Computing and Big-data Services. Springer, 363\u2013369."},{"key":"e_1_3_2_225_2","first-page":"1","volume-title":"2016 13th International Conference on Service Systems and Service Management (ICSSSM)","author":"Tian Feng","year":"2016","unstructured":"Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In 2016 13th International Conference on Service Systems and Service Management (ICSSSM). IEEE, 1\u20136."},{"key":"e_1_3_2_226_2","first-page":"1357","volume-title":"2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","author":"Tse Daniel","year":"2017","unstructured":"Daniel Tse, Bowen Zhang, Yuchen Yang, Chenli Cheng, and Haoran Mu. 2017. Blockchain application in food supply information security. In 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, 1357\u20131361."},{"key":"e_1_3_2_227_2","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/CBI.2017.56","volume-title":"2017 IEEE 19th Conference on Business Informatics (CBI)","volume":"1","author":"Nakasumi Mitsuaki","year":"2017","unstructured":"Mitsuaki Nakasumi. 2017. Information sharing for supply chain management based on block chain technology. In 2017 IEEE 19th Conference on Business Informatics (CBI), Vol. 1. IEEE, 140\u2013149."},{"key":"e_1_3_2_228_2","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.future.2018.04.061","article-title":"Research on agricultural supply chain system with double chain architecture based on blockchain technology","volume":"86","author":"Leng Kaijun","year":"2018","unstructured":"Kaijun Leng, Ya Bi, Linbo Jing, Han-Chi Fu, and Inneke Van Nieuwenhuyse. 2018. Research on agricultural supply chain system with double chain architecture based on blockchain technology. Future Generation Computer Systems 86 (2018), 641\u2013649.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_229_2","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/j.cie.2019.07.023","article-title":"Blockchains in operations and supply chains: A model and reference implementation","volume":"136","author":"Helo Petri","year":"2019","unstructured":"Petri Helo and Yuqiuge Hao. 2019. Blockchains in operations and supply chains: A model and reference implementation. Computers & Industrial Engineering 136 (2019), 242\u2013251.","journal-title":"Computers & Industrial Engineering"},{"key":"e_1_3_2_230_2","first-page":"1","volume-title":"First Purpose Built Protocol for Supply Chains Based on Blockchain","author":"Rakic Branimir","year":"2017","unstructured":"Branimir Rakic, Tomaz Levak, Ziga Drev, Sava Savic, and Aleksandar Veljkovic. 2017. First Purpose Built Protocol for Supply Chains Based on Blockchain. Technical Report. 1\u201313."},{"key":"e_1_3_2_231_2","first-page":"1","volume-title":"CargoX Business Overview and Technology Bluepaper","year":"2018","unstructured":"2018. CargoX Business Overview and Technology Bluepaper. Technical Report. 1\u201390."},{"key":"e_1_3_2_232_2","first-page":"1","volume-title":"Ambrosus White Paper","year":"2017","unstructured":"2017. Ambrosus White Paper. Technical Report. 1\u201337."},{"key":"e_1_3_2_233_2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.mfglet.2018.02.006","article-title":"Digital twin\u2013Proof of concept","volume":"15","author":"Haag Sebastian","year":"2018","unstructured":"Sebastian Haag and Reiner Anderl. 2018. Digital twin\u2013Proof of concept. Manufacturing Letters 15 (2018), 64\u201366.","journal-title":"Manufacturing Letters"},{"key":"e_1_3_2_234_2","first-page":"59","volume-title":"Mechatronic Futures","author":"Boschert Stefan","year":"2016","unstructured":"Stefan Boschert and Roland Rosen. 2016. Digital twin - The simulation aspect. In Mechatronic Futures. Springer, 59\u201374."},{"issue":"3","key":"e_1_3_2_235_2","doi-asserted-by":"crossref","first-page":"3440","DOI":"10.1109\/JSYST.2020.2970167","article-title":"A lightweight ECC-based authentication scheme for Internet of Things (IoT)","volume":"14","author":"Hammi Badis","year":"2020","unstructured":"Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally, and Youcef Begriche. 2020. A lightweight ECC-based authentication scheme for Internet of Things (IoT). IEEE Systems Journal 14, 3 (2020), 3440\u20133450.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"e_1_3_2_236_2","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","article-title":"The advantages of elliptic curve cryptography for wireless security","volume":"11","author":"Lauter Kristin","year":"2004","unstructured":"Kristin Lauter. 2004. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11, 1 (2004), 62\u201367.","journal-title":"IEEE Wireless Communications"},{"key":"e_1_3_2_237_2","first-page":"100075","article-title":"Cryptographic technologies and protocol standards for Internet of Things","author":"Zeadally Sherali","year":"2019","unstructured":"Sherali Zeadally, Ashok Kumar Das, and Nicolas Sklavos. 2019. Cryptographic technologies and protocol standards for Internet of Things. Internet of Things (2019), 100075.","journal-title":"Internet of Things"},{"key":"e_1_3_2_238_2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","article-title":"Bubbles of trust: A decentralized blockchain-based authentication system for IoT","volume":"78","author":"Hammi Mohamed Tahar","year":"2018","unstructured":"Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126\u2013142.","journal-title":"Computers & Security"},{"key":"e_1_3_2_239_2","doi-asserted-by":"crossref","first-page":"107593","DOI":"10.1016\/j.comnet.2020.107593","article-title":"A survey on physical unclonable function (PUF)-based security solutions for Internet of Things","volume":"183","author":"Shamsoshoara Alireza","year":"2020","unstructured":"Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, and Sherali Zeadally. 2020. A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Computer Networks 183 (2020), 107593.","journal-title":"Computer Networks"},{"key":"e_1_3_2_240_2","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.future.2019.07.059","article-title":"Predicting supply chain risks using machine learning: The trade-off between performance and interpretability","volume":"101","author":"Baryannis George","year":"2019","unstructured":"George Baryannis, Samir Dani, and Grigoris Antoniou. 2019. Predicting supply chain risks using machine learning: The trade-off between performance and interpretability. Future Generation Computer Systems 101 (2019), 993\u20131004.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_241_2","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/ISI.2013.6578830","volume-title":"2013 IEEE International Conference on Intelligence and Security Informatics","author":"Zage David","year":"2013","unstructured":"David Zage, Kristin Glass, and Richard Colbaugh. 2013. Improving supply chain security using big data. In 2013 IEEE International Conference on Intelligence and Security Informatics. IEEE, 254\u2013259."},{"key":"e_1_3_2_242_2","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/EISIC.2012.39","volume-title":"2012 European Intelligence and Security Informatics Conference","author":"Camossi Elena","year":"2012","unstructured":"Elena Camossi, Tatyana Dimitrova, and Aris Tsois. 2012. Detecting anomalous maritime container itineraries for anti-fraud and supply chain security. In 2012 European Intelligence and Security Informatics Conference. IEEE, 76\u201383."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3588999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:39Z","timestamp":1750178859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":241,"journal-issue":{"issue":"14s","published-print":{"date-parts":[[2023,12,31]]}},"alternative-id":["10.1145\/3588999"],"URL":"https:\/\/doi.org\/10.1145\/3588999","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"2022-01-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}