A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A survey on developer-centred security
Software developers are key players in the security ecosystem as they produce code that
runs on millions of devices. Yet we continue to see insecure code being developed and …
runs on millions of devices. Yet we continue to see insecure code being developed and …
On the impact of security vulnerabilities in the npm package dependency network
Security vulnerabilities are among the most pressing problems in open source software
package libraries. It may take a long time to discover and fix vulnerabilities in packages. In …
package libraries. It may take a long time to discover and fix vulnerabilities in packages. In …
Empirical analysis of security vulnerabilities in python packages
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …
open platform of reusable packages that speed up and facilitate development tasks …
Are iphones really better for privacy? comparative study of ios and android apps
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …
A qualitative study of dependency management and its security implications
Several large scale studies on the Maven, NPM, and Android ecosystems point out that
many developers do not often update their vulnerable software libraries thus exposing the …
many developers do not often update their vulnerable software libraries thus exposing the …
Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation
F Wang, L Wang, G Li, Y Wang, C Lv, L Qi - World Wide Web, 2022 - Springer
A growing number of web APIs published on the Internet allows mashup developers to
discover appropriate web APIs for polishing mashups. Developers often have to manually …
discover appropriate web APIs for polishing mashups. Developers often have to manually …
An empirical study of usages, updates and risks of third-party libraries in java projects
Third-party libraries play a key role in software development as they can relieve developers
of the heavy burden of re-implementing common functionalities. However, third-party …
of the heavy burden of re-implementing common functionalities. However, third-party …
Understanding software-2.0: A study of machine learning library usage and evolution
Enabled by a rich ecosystem of Machine Learning (ML) libraries, programming using
learned models, ie, Software-2.0, has gained substantial adoption. However, we do not …
learned models, ie, Software-2.0, has gained substantial adoption. However, we do not …
Out of sight, out of mind? How vulnerable dependencies affect open-source projects
Context Software developers often use open-source libraries in their project to improve
development speed. However, such libraries may contain security vulnerabilities, and this …
development speed. However, such libraries may contain security vulnerabilities, and this …