Critical Nodes - Watson Project
[...] In summary, for the same stakeholders, different supply chains exhibit different vulnerabilities, which demonstrates the need to consider the special circumstances of supply chains when developing food fraud mitigation measures.