Cited By
View all- Rebatchi HBissyandé TMoha N(2024)Dependabot and security pull requests: large empirical studyEmpirical Software Engineering10.1007/s10664-024-10523-y29:5Online publication date: 30-Jul-2024
- Wei YZheng JZhong H(2024)A Systematic Method for Constructing ICT Supply Chain Security RequirementsEmerging Information Security and Applications10.1007/978-981-99-9614-8_4(58-76)Online publication date: 4-Jan-2024
- Ladisa PSahin MPonta SRosa MMartinez MBarais OTorres-Arias SMelara MSimon LVasilakis NMoriarty K(2023)The Hitchhiker's Guide to Malicious Third-Party DependenciesProceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses10.1145/3605770.3625212(65-74)Online publication date: 30-Nov-2023
- Show More Cited By