Author:
Alqahtani Sultan S.,Eghan Ellis E.,Rilling Juergen
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
2. Third-Party Library Dependency for Large-Scale SCA in the C/C++ Ecosystem: How Far Are We?;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
3. A Practical Model Driven Approach for Designing Security Aware RESTful Web APIs Using SOFL;IEICE Transactions on Information and Systems;2023-05-01
4. A Semantic Web-Enabled Approach for Dependency Management;International Journal of Software Engineering and Knowledge Engineering;2022-09
5. Electro search optimization based long short‐term memory network for mobile malware detection;Concurrency and Computation: Practice and Experience;2022-06-02