{"title":"Minimizing the expected cybersecurity loss in a software supply chain through scheduling scanning jobs","authors":"Jen-Ya Wang","doi":"10.1016/j.cor.2025.107064","DOIUrl":null,"url":null,"abstract":"<div><div>Third-party cybersecurity providers in a software supply chain execute scanning jobs according to business policies and government regulations, tailoring responses to each node’s unique attributes and risks. Traditionally, providers might use various tools at different times without coordination, leading to resource bottlenecks. This study introduces a novel approach to scanning job scheduling, addressing the unique challenge where the marginal benefit of scanning time varies non-linearly, unlike traditional job scheduling problems. The findings reveal that upgrading a scanning strategy by one level can quantify the reduced loss, providing a foundation for efficient resource allocation in large-scale supply chains. A branch-and-bound algorithm is developed to generate the optimal schedules, serving as a benchmark for evaluating other metaheuristic algorithms. Furthermore, this study proposes an innovative genetic algorithm incorporating dynamic crossover or mutation rates, as well as mechanisms to prevent premature convergence and improve performance. This approach demonstrates practical scalability and efficiency in scheduling scanning jobs across 300 nodes, ensuring adaptability to real-world supply chains.</div></div>","PeriodicalId":10542,"journal":{"name":"Computers & Operations Research","volume":"180 ","pages":"Article 107064"},"PeriodicalIF":4.1000,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Operations Research","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0305054825000929","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Third-party cybersecurity providers in a software supply chain execute scanning jobs according to business policies and government regulations, tailoring responses to each node’s unique attributes and risks. Traditionally, providers might use various tools at different times without coordination, leading to resource bottlenecks. This study introduces a novel approach to scanning job scheduling, addressing the unique challenge where the marginal benefit of scanning time varies non-linearly, unlike traditional job scheduling problems. The findings reveal that upgrading a scanning strategy by one level can quantify the reduced loss, providing a foundation for efficient resource allocation in large-scale supply chains. A branch-and-bound algorithm is developed to generate the optimal schedules, serving as a benchmark for evaluating other metaheuristic algorithms. Furthermore, this study proposes an innovative genetic algorithm incorporating dynamic crossover or mutation rates, as well as mechanisms to prevent premature convergence and improve performance. This approach demonstrates practical scalability and efficiency in scheduling scanning jobs across 300 nodes, ensuring adaptability to real-world supply chains.
期刊介绍:
Operations research and computers meet in a large number of scientific fields, many of which are of vital current concern to our troubled society. These include, among others, ecology, transportation, safety, reliability, urban planning, economics, inventory control, investment strategy and logistics (including reverse logistics). Computers & Operations Research provides an international forum for the application of computers and operations research techniques to problems in these and related fields.