Login / Signup
On the Impact of Security Vulnerabilities in the npm and RubyGems Dependency Networks.
Ahmed Zerouali
Tom Mens
Alexandre Decan
Coen De Roover
Published in:
CoRR (2021)
Keyphrases
</>
security vulnerabilities
intrusion detection
social networks
network structure
dos attacks
computer networks
penetration testing
attack graphs
web applications
data management
data processing
network security
security properties
attack graph
unauthorized access