Critical Nodes - Watson Project

[...] In summary, for the same stakeholders, different supply chains exhibit different vulnerabilities, which demonstrates the need to consider the special circumstances of supply chains when developing food fraud mitigation measures.