ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1907.03407
  4. Cited By
Lags in the Release, Adoption, and Propagation of npm Vulnerability
  Fixes
v1v2v3v4v5 (latest)

Lags in the Release, Adoption, and Propagation of npm Vulnerability Fixes

8 July 2019
Bodin Chinthanet
R. Kula
Shane McIntosh
T. Ishio
Akinori Ihara
Ken-ichi Matsumoto
ArXiv (abs)PDFHTML

Papers citing "Lags in the Release, Adoption, and Propagation of npm Vulnerability Fixes"

8 / 8 papers shown
Title
Enhancing Software Supply Chain Resilience: Strategy For Mitigating
  Software Supply Chain Security Risks And Ensuring Security Continuity In
  Development Lifecycle
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development Lifecycle
Ahmed Akinsola
Abdullah Akinde
25
3
0
08 Jul 2024
DONAPI: Malicious NPM Packages Detector using Behavior Sequence
  Knowledge Mapping
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping
Cheng Huang
Nannan Wang
Ziteng Wang
Siqi Sun
Lingzi Li
Junren Chen
Qianchong Zhao
Jiaxuan Han
Zhen Yang
Lei Shi Sichuan University
55
11
0
13 Mar 2024
Why Not Mitigate Vulnerabilities in Helm Charts?
Why Not Mitigate Vulnerabilities in Helm Charts?
Yihao Chen
Jiahuei Lin
Bram Adams
Ahmed E. Hassan
36
0
0
23 Dec 2023
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation
Wenya Wang
Xingwei Lin
Jingyi Wang
Wang Gao
Dawu Gu
Wei Lv
Jiashui Wang
39
3
0
24 Jun 2023
Multi-Granularity Detector for Vulnerability Fixes
Multi-Granularity Detector for Vulnerability Fixes
Truong-Giang Nguyen
Thanh Le-Cong
Hong Jin Kang
Ratnadira Widyasari
Chengran Yang
...
Jiayuan Zhou
Xin Xia
A. Hassan
X. Le
David Lo
54
19
0
23 May 2023
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from
  Vulnerability Reports
CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Yu-zeng Lyu
Thanh Le-Cong
Hong Jin Kang
Ratnadira Widyasari
Zhipeng Zhao
X. Le
Ming Li
David Lo
65
17
0
10 Jan 2023
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction
  and Vulnerability Propagation Study
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study
Peiyang Jia
Chengwei Liu
Hongyu Sun
Chengyi Sun
Mianxue Gu
Yang Liu
Yuqing Zhang
23
3
0
14 Oct 2022
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security
  Releases of Open Source Packages
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages
Nasif Imtiaz
A. Khanom
Laurie A. Williams
38
21
0
13 Dec 2021
1