Cited By
View all- Shen YGao XSun HGuo Y(2025)Understanding vulnerabilities in software supply chainsEmpirical Software Engineering10.1007/s10664-024-10581-230:1Online publication date: 1-Feb-2025
- Huang YWang RZheng WZhou ZWu SKe SChen BGao SPeng XFilkov VRay BZhou M(2024)SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and MatchingProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695492(1146-1158)Online publication date: 27-Oct-2024
- Tiwari DToady TMonperrus MBaudry BRoychoudhury PPaiva AAbreu RStorey MSharif BXia X(2024)With Great Humor Comes Great Developer EngagementProceedings of the 46th International Conference on Software Engineering: Software Engineering in Society10.1145/3639475.3640099(1-11)Online publication date: 14-Apr-2024
- Show More Cited By