Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates.
Hamid MohayejiAndrei AgaronianEleni ConstantinouNicola ZannoneAlexander SerebrenikPublished in: MSR (2023)
Keyphrases
- information security
- security risks
- intrusion detection
- security issues
- computer security
- access control
- network security
- security measures
- low resolution
- information assurance
- high resolution
- security problems
- elliptic curve
- key management
- security requirements
- security policies
- security mechanisms
- security model
- security systems
- security level
- security properties
- security threats
- network management
- countermeasures