On the Use of Dependabot Security Pull Requests.
Mahmoud AlfadelDiego Elias CostaEmad ShihabMouafak MkhallalatiPublished in: MSR (2021)
Keyphrases
- access control
- information security
- security requirements
- intrusion detection
- security policies
- computer security
- security issues
- security properties
- data security
- security systems
- neural network
- security threats
- sensitive data
- security level
- security management
- security vulnerabilities
- information assurance
- security mechanisms
- functional requirements
- network security
- wireless networks
- control system
- social networks
- data mining