Traceability and Risk Analysis Strategies for Addressing Counterfeit Electronics in Supply Chains for Complex Systems
暂无分享,去创建一个
Zachary A. Collier | Igor Linkov | Robin B. Gray | Daniel DiMase | Jinae Carlson | I. Linkov | Daniel DiMase | Z. Collier | Jinae Carlson | Robin B Gray
[1] Zachary A. Collier,et al. A Decision Analytical Approach for Department of Defense Acquisition Risk Management. , 2012 .
[2] Germaine H. Saad,et al. Managing Disruption Risks in Supply Chains , 2005 .
[3] M. Christopher,et al. Building the Resilient Supply Chain , 2004 .
[4] Keely L. Croxton,et al. From risk to resilience: Learning to deal with disruption , 2015 .
[5] G ci Continuous Improvement. Fraudulent/Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition , 2013 .
[6] Virginia Chanley,et al. DOD Supply Chain: Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms , 2012 .
[7] B. Beamon. Supply chain design and analysis:: Models and methods , 1998 .
[8] Zachary A. Collier,et al. Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.
[9] Walter E. Beyeler,et al. The value of utilising stochastic mapping of food distribution networks for understanding risks and tracing contaminant pathways , 2012, Int. J. Crit. Infrastructures.
[10] James A. Hayward,et al. DNA Marking and Authentication: A unique, secure anti-counterfeiting program for the electronics industry , 2011 .
[11] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[12] Zachary A. Collier,et al. Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.
[13] Andreas Norrman,et al. Categorization of supply chain risk and risk management , 2004 .
[14] Zachary A. Collier,et al. A Semi-Quantitative Risk Assessment Standard for Counterfeit Electronics Detection , 2014 .
[15] Chris I. Enyinda,et al. Sense and Respond Supply Chain: A Prescription for Mitigating Vulnerability in the U.S. Pharmaceutical Value Chain , 2008 .
[16] Zachary A. Collier,et al. Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks , 2013, Environment Systems and Decisions.
[17] Zachary A. Collier,et al. Risk-based standards: integrating top–down and bottom–up approaches , 2014, Environment Systems and Decisions.
[18] Robert E. Spekman,et al. An empirical investigation into supply chain management: a perspective on partnerships , 1998 .
[19] Yaw S. Obeng,et al. Development of a Methodology to Determine Risk of Counterfeit Use | NIST , 2013 .
[20] M. Pecht,et al. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.
[21] C. Franck,et al. Framework for Supply Chain Risk Management , 2007 .
[22] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead , 2014, J. Electron. Test..
[23] H. Livingston. Avoiding Counterfeit Electronic Components , 2007, IEEE Transactions on Components and Packaging Technologies.
[24] Elgar Fleisch,et al. Probabilistic Approach for Location-Based Authentication , 2007 .
[25] Christopher S. Tang. Perspectives in supply chain risk management , 2006 .
[26] Essam Shehab,et al. Obsolescence management for long-life contracts: state of the art and future trends , 2010 .
[27] Bhanu Sood,et al. Screening for counterfeit electronic parts , 2011 .
[28] Roger Anderson,et al. Homeland Security , 2004, Gov. Inf. Q..
[29] OBSERVATIONS ON EFFORTS TO QUANTIFY THE ECONOMIC EFFECTS OF COUNTERFEIT AND PIRATED GOODS , 2010 .
[30] D. Kiron,et al. The talent dividend , 2015 .
[31] Iwan Vanany,et al. Supply Chain Risk Management: Literature Review and Future Research , 2007, Int. J. Inf. Syst. Supply Chain Manag..
[32] Cliff Wang,et al. Introduction to Hardware Security and Trust , 2011 .
[33] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .