SUPPLY CHAIN ATTACK DETECTION THROUGH LIFECYCLE-AWARE ANOMALY SYSTEMS: INTEGRATION OF END-OF-LIFE CONTEXT FOR IDENTIFYING MAINTENANCE TRANSITION ANOMALIES
DOI:
https://doi.org/10.30888/2663-5712.2026-35-01-117Keywords:
supply chain attack, anomaly detection, End-of-Life, OpenEoX, lifecycle transition, fork succession, package hijacking, behavioral analysis, SBOM securityAbstract
Supply chain attacks targeting software dependencies represent an escalating threat vector, with adversaries increasingly exploiting lifecycle transitions-particularly End-of-Life (EoL) and maintenance handover events-to introduce malicious code into trusDownloads
Published
2026-01-30
How to Cite
Дем’янчук, С., Мартиненко, Р., & Лопухович, В. (2026). SUPPLY CHAIN ATTACK DETECTION THROUGH LIFECYCLE-AWARE ANOMALY SYSTEMS: INTEGRATION OF END-OF-LIFE CONTEXT FOR IDENTIFYING MAINTENANCE TRANSITION ANOMALIES. SWorldJournal, 1(35-01), 229–240. https://doi.org/10.30888/2663-5712.2026-35-01-117
Issue
Section
Articles
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution 4.0 International License.


