1. Boyens, J., Paulsen, C., Bartol, N., Shankles, S.A., Moorthy, R.: Notional supply chain risk management practices for federal information systems. National Institute of Standards and Technology, Gaithersburg, MD (2012). https://doi.org/10.6028/NIST.IR.7622
2. Supply Chain Compromise, Technique T1195 - Enterprise | MITRE ATT&CK®. https://attack.mitre.org/techniques/T1195/. Accessed 10 June 2023
3. TC260: GB/T 36637-2018 Information security technology-Guidelines for the information and communication technology supply chain risk management (in Chinese) (2018)
4. ENISA Threat Landscape 2022. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022. Accessed 11 May 2023
5. Supply Chain Integrity: An overview of the ICT supply chain risks and challenges, and vision for the way forward (2015). https://www.enisa.europa.eu/publications/sci-2015. Accessed 25 May 2023