The sharing economics of digital resources such as application programming interface and software development kits enables software developers to create diverse software faster and more effectively. However, developers may unintentionally adopt shared digital resources that contain vulnerable code, which may cause vulnerability in the final software product. In this study, we examine the interplay between the sharing of digital resources and software vulnerability. This study may help developers to identify vulnerable digital resources in a digital ecosystem. We quantify the diffusion of software vulnerability in sharing of digital resources using a machine learning technique to create necessary variables. We conduct regression analyses to ...
Web applications have been gaining increased popularity around the globe, in such a way that a growi...
The proliferation of information and communication technologies (icts) into all aspects of life pose...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
Software reuse is a widely adopted practice among both researchers and practitioners. The relation b...
Reuse is a common and often-advocated software development practice. Significant efforts have been i...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
Software reuse is a widely adopted practice among both researchers and practitioners. The relation b...
Software vulnerabilities are the root cause of many computer system security fail- ures. This disser...
Software vulnerabilities are weaknesses in source code that can be potentially exploited to cause lo...
There is an increasing trend to mine vulnerabilities from software repositories and use machine lear...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Background: Software vulnerabilities are weaknesses in source code that might be exploited to cause ...
Web applications have been gaining increased popularity around the globe, in such a way that a growi...
The proliferation of information and communication technologies (icts) into all aspects of life pose...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...
Software reuse is a widely adopted practice among both researchers and practitioners. The relation b...
Reuse is a common and often-advocated software development practice. Significant efforts have been i...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
Software vulnerabilities are the root cause of many computer system security failures. This disserta...
Software reuse is a widely adopted practice among both researchers and practitioners. The relation b...
Software vulnerabilities are the root cause of many computer system security fail- ures. This disser...
Software vulnerabilities are weaknesses in source code that can be potentially exploited to cause lo...
There is an increasing trend to mine vulnerabilities from software repositories and use machine lear...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilit...
Background: Software vulnerabilities are weaknesses in source code that might be exploited to cause ...
Web applications have been gaining increased popularity around the globe, in such a way that a growi...
The proliferation of information and communication technologies (icts) into all aspects of life pose...
Known security vulnerabilities are introduced in software systems as a result of depending on third-...