This data package contains supplemental material data for the under review TSE submission: A Socio-technical Perspective on Software Vulnerabilities: A Causal Analysis. The restricted access requirement will be lifted upon approval of the manuscript. The comprehensive explanation of this dataset can be found at: https://sailuh.github.io/causal_commit_flow_docs The following briefly describes the contents of the folders. The analysis presented in the manuscript requires the following: Git Log Mailing List Software Vulnerabilities (NVD Feed) This data is provided to a mining software repository tool, Kaiaulu. The data specifications and configuration parameters are defined in the OpenSSL project configuration file (.yml), also inclu...
The prevalent usage of open-source software (OSS) has led to an increased interest in resolving pote...
Software vulnerabilities are a major concern for companies as they must ensure that their data is pr...
CVEfixes is a comprehensive vulnerability dataset that is automatically collected and curated from C...
Online appendix of the paper entitled: "The Secret Life of Software Vulnerabilities: A Large-Scale E...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
With the increase in the demand of software systems, there is an increase in the demand for efficien...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
This dataset is associated with the paper ""Why Security Defects Go Unnoticed during Code Reviews? A...
Context: Coordination is a fundamental tenet of software engineering. Coordination is required also ...
Software vulnerabilities enable malicious actors to exploit security weaknesses of a software system...
Context: Software security is considered a major aspect of software quality as the number of discove...
There is little or no information available on what actually happens when a software vulnerability i...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
Modern software development involves the usage of external third-party software projects as direct d...
Reducing the time taken to discover and fix vulnerabilities in open source software projects is incr...
The prevalent usage of open-source software (OSS) has led to an increased interest in resolving pote...
Software vulnerabilities are a major concern for companies as they must ensure that their data is pr...
CVEfixes is a comprehensive vulnerability dataset that is automatically collected and curated from C...
Online appendix of the paper entitled: "The Secret Life of Software Vulnerabilities: A Large-Scale E...
Software vulnerabilities play a major role, as there are multiple risks associated, including loss a...
With the increase in the demand of software systems, there is an increase in the demand for efficien...
Software vulnerabilities are defects or weaknesses in a software system that if exploited can lead t...
This dataset is associated with the paper ""Why Security Defects Go Unnoticed during Code Reviews? A...
Context: Coordination is a fundamental tenet of software engineering. Coordination is required also ...
Software vulnerabilities enable malicious actors to exploit security weaknesses of a software system...
Context: Software security is considered a major aspect of software quality as the number of discove...
There is little or no information available on what actually happens when a software vulnerability i...
The consequences of a class of system failures, commonly known as software vulnerabilities, violate ...
Modern software development involves the usage of external third-party software projects as direct d...
Reducing the time taken to discover and fix vulnerabilities in open source software projects is incr...
The prevalent usage of open-source software (OSS) has led to an increased interest in resolving pote...
Software vulnerabilities are a major concern for companies as they must ensure that their data is pr...
CVEfixes is a comprehensive vulnerability dataset that is automatically collected and curated from C...