ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2411.11202
  4. Cited By

Forecasting the risk of software choices: A model to foretell security vulnerabilities from library dependencies and source code evolution

17 November 2024
C. E. Budde
Ranindya Paramitha
Fabio Massacci
ArXiv (abs)PDFHTML

Papers citing "Forecasting the risk of software choices: A model to foretell security vulnerabilities from library dependencies and source code evolution"

6 / 6 papers shown
Title
Cross-ecosystem categorization: A manual-curation protocol for the
  categorization of Java Maven libraries along Python PyPI Topics
Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics
Ranindya Paramitha
Yuan Feng
Fabio Massacci
Carlos E. Budde
47
1
0
10 Mar 2024
Large Language Models Are Zero-Shot Time Series Forecasters
Large Language Models Are Zero-Shot Time Series Forecasters
Nate Gruver
Marc Finzi
Shikai Qiu
Andrew Gordon Wilson
AI4TS
95
372
0
11 Oct 2023
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions
  with Community-Driven Insights
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
Jay Jacobs
Sasha Romanosky
Octavian Suciuo
Benjamin Edwards
Armin Sarabi
46
22
0
27 Feb 2023
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
  Aspect Explanation
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Jiamou Sun
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Thong Hoang
Dehai Zhao
64
15
0
15 Feb 2023
Vulnerable Open Source Dependencies: Counting Those That Matter
Vulnerable Open Source Dependencies: Counting Those That Matter
Ivan Pashchenko
H. Plate
Serena Elisa Ponta
A. Sabetta
Fabio Massacci
39
105
0
29 Aug 2018
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the
  Attack Trees
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees
Barbara Kordy
L. Piètre-Cambacédès
P. Schweitzer
84
339
0
29 Mar 2013
1