From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models., , , , и . CoRR, (2024)Breast Cancer Prediction with Gaussian Process Using Anthropometric Parameters., , , , и . ICCCNT, стр. 1-6. IEEE, (2021)Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard., , , , , и . ICSE (SEET), стр. 95-104. IEEE, (2021)Software Supply Chain Risk Assessment Framework.. ICSE Companion, стр. 251-255. IEEE, (2023)OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics., , , , и . IEEE Secur. Priv., 21 (6): 76-88 (ноября 2023)What are Weak Links in the npm Supply Chain?, , , , , и . ICSE (SEIP), стр. 331-340. IEEE, (2022)PREPRINT: Can the OpenSSF Scorecard be used to measure the security posture of npm and PyPI?, , , , и . CoRR, (2022)Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages., , , , и . CoRR, (2024)Do Software Security Practices Yield Fewer Vulnerabilities?, , , и . ICSE-SEIP, стр. 292-303. IEEE, (2023)Application of industrial engineering in blazer making, , , , , и . Global Journal of Engineering and Technology Advances, 9 (1): 011-035 (октября 2021)