Publisher
Springer International Publishing
Reference44 articles.
1. Alberts, C.J., Dorofee, A.J., Creel, R., Ellison, R.J., Woody, C.: A systemic approach for assessing software supply-chain risk. In: 2011 44th Hawaii International Conference on System Sciences, Kauai, HI, pp. 1–8, January 2011. https://doi.org/10.1109/HICSS.2011.36
2. Argon: 2021 software supply chain security report (2021). https://info.aquasec.com/argon-supply-chain-attacks-study
3. Armando, A., Costa, G., Merlo, A., Verderame, L.: Enabling BYOD through secure meta-market. In: Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec 2014, pp. 219–230. Association for Computing Machinery, New York (2014). https://doi.org/10.1145/2627393.2627410
4. Barabási, A.L.: Network Science. Cambridge University Press (2016). http://networksciencebook.com/
5. Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing google home: why silence will not protect your privacy. J. Wireless Mob. Netw. Ubiquit. Comput. Dependable Appl., 35–53 (2020). https://doi.org/10.22667/JOWUA.2020.03.31.035
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献