1 code implementation • 20 Mar 2020 • Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu
Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT.
Cryptography and Security Systems and Control Systems and Control
1 code implementation • 28 Nov 2019 • Timothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu
Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity.
Cryptography and Security