How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages?
Md Mahir Asef KabirYing WangDanfeng YaoNa MengPublished in: SecDev (2022)
Keyphrases
- open source
- end users
- security issues
- case study
- software systems
- information security
- databases
- access control
- leading edge
- closely related
- security problems
- security management
- network security
- software engineering
- software packages
- security analysis
- development process
- functional requirements
- security requirements
- biometric systems
- statistical databases
- computer networks
- intrusion detection
- artificial intelligence