no code implementations • 22 Jul 2021 • Ajmal Aziz, Edward Elson Kosasih, Ryan-Rhys Griffiths, Alexandra Brintrup
It is anticipated that our method will be directly applicable to businesses wishing to sever links with nefarious entities and mitigate risk of supply failure.