Funder
fonds de la recherche scientifique - fnrs
fwo-vlaanderen
Publisher
Springer Science and Business Media LLC
Reference54 articles.
1. Agresti A, Coull BA (1998) Approximate is better than “exact” for interval estimation of binomial proportions. The American Statistician 52 (2):119–126
2. Alexopoulos N, Meneely A, Arnouts D, Mühlhäuser M. (2021) Who are vulnerability reporters? a large-scale empirical study on floss. In: Proceedings of the 15th ACM/IEEE international symposium on empirical software engineering and measurement (ESEM), pp 1–12
3. Alfadel M, Costa DE, Shihab E (2021) Empirical analysis of security vulnerabilities in Python packages. In: International conference on software analysis, evolution and reengineering. IEEE
4. Aranovich R, Wu M, Yu D, Katsy K, Ahmadnia K, Bishop M, Filkov V, Sagae K (2021) Beyond nvd: Cybersecurity meets the semantic web
5. Birsan A (2021) Dependency confusion: How I hacked into Apple, Microsoft and dozens of other companies. https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610. Accessed 7 May 2021
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
2. Dependabot and security pull requests: large empirical study;Empirical Software Engineering;2024-07-30
3. VulNet: Towards improving vulnerability management in the Maven ecosystem;Empirical Software Engineering;2024-06-05
4. Quantifying Security Issues in Reusable JavaScript Actions in GitHub Workflows;Proceedings of the 21st International Conference on Mining Software Repositories;2024-04-15
5. Mitigating Security Issues in GitHub Actions;Proceedings of the 2024 ACM/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE/ACM Second International Workshop on Software Vulnerability;2024-04-15