Show simple item record

dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorSæle, Hanne
dc.date.accessioned2024-04-26T13:38:06Z
dc.date.available2024-04-26T13:38:06Z
dc.date.created2023-11-29T17:21:46Z
dc.date.issued2024
dc.identifier.citationProceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark. 2024, 235-249.en_US
dc.identifier.isbn978-981-99-6974-6
dc.identifier.issn2213-8684
dc.identifier.urihttps://hdl.handle.net/11250/3128256
dc.description.abstractCritical infrastructure applications do not emerge fully formed, but generally rely on components and services from third-party vendors. This paper presents a brief survey on good practice for security requirements to be put on vendors delivering products and services to power distribution system operators and other critical infrastructure operators.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.relation.ispartofCyber Science 2023 - Proceedings of the International Conference on Cybersecurity, Cyber Situational Awareness and Social Media
dc.relation.urihttps://jaatun.no/papers/2023/A_Checklist_for_Supply_Chain_Security.pdf
dc.titleA Checklist for Supply Chain Security for Critical Infrastructure Operatorsen_US
dc.typeChapteren_US
dc.description.versionacceptedVersionen_US
dc.rights.holder© 2024 The authors/SINTEFen_US
dc.source.pagenumber235-249en_US
dc.source.journalSpringer Proceedings in Complexityen_US
dc.source.issue1en_US
dc.identifier.doi10.1007/978-981-99-6974-6_14
dc.identifier.cristin2205612
dc.relation.projectNorges forskningsråd: 257626en_US
dc.relation.projectNorges forskningsråd: 310105en_US
cristin.ispublishedfalse
cristin.fulltextpostprint


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record