By Topic

Vulnerability assessment of a food supply chain to an intentional attack

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yanling Chang ; School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, 30332, USA ; Yu Zhang ; Alan L. Erera ; Chelsea C. White

Our objective is to develop an approach for quantifying the vulnerability of a food product supply chain that may be used by an intelligent adversary to deliver a chemical or biological agent. The approach is intended to create control strategies that seek to ensure a high level of system productivity while mitigating risk. We have developed a supply chain process model that determines the consequence of a given attack, in terms of the number of contaminated containers exiting the production system. An attacker-defender sequential game model is also developed to determine the likelihood that the system is successfully attacked as a function of how the targets are protected in the presence of an intelligent attacker. The combined model determines the expected impact of a successful attack and provides near optimal control strategies. A case study is built for the liquid egg production industry, which compares the productivity and vulnerability of two alternative supply chain designs.

Published in:

Homeland Security (HST), 2012 IEEE Conference on Technologies for

Date of Conference:

13-15 Nov. 2012