Author:
Alqahtani Sultan S.,Eghan Ellis E.,Rilling Juergen
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assessing the Threat Level of Software Supply Chains with the Log Model;2023 IEEE International Conference on Big Data (BigData);2023-12-15
2. Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain;Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering;2023-12-08
3. Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem;2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE);2023-09-11
4. Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06
5. Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report);2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE);2022-10