This is the research artifact of the paper "Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem"
This dataset relates to the publication: "Groundwater-dependent ecosystems at risk – global hot...
This is the method file for Making waves: Topic modeling discovers trending topics in global researc...
Harmful algal blooms (HABs) produce local impacts in nearly all freshwater and marine systems. They ...
This is the research artifact of the paper "Understanding the Threats of Upstream Vulnerabilities to...
This contains the replication package for the SANER'22 paper. Please read the README file for usage ...
As computer networks evolve, so too does the techniques used by attackers to exploit new vulnerabili...
This is a research artifact for the paper Disrupting Software Ecosystems: Case Studies on the Impact...
The Maven dependency graph is an open dataset of Maven Central artifacts, their dependencies, as wel...
The Maven Dependency Dataset contains the data as described in the paper "Mining Metrics, Changes an...
Disclaimer: This is a DRAFT document that does not represent an official position of The MITRE Corpo...
These file is supplementary file for article "Increased Leaf Bacterial Network Complexity along the ...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
<p>The node attack vulnerability of the real networks analyzed in this paper.</p
International audienceThis article was submitted without an abstract, please refer to the full-text ...
This document is the compilation of the three threat reports that were producedindependently by the ...
This dataset relates to the publication: "Groundwater-dependent ecosystems at risk – global hot...
This is the method file for Making waves: Topic modeling discovers trending topics in global researc...
Harmful algal blooms (HABs) produce local impacts in nearly all freshwater and marine systems. They ...
This is the research artifact of the paper "Understanding the Threats of Upstream Vulnerabilities to...
This contains the replication package for the SANER'22 paper. Please read the README file for usage ...
As computer networks evolve, so too does the techniques used by attackers to exploit new vulnerabili...
This is a research artifact for the paper Disrupting Software Ecosystems: Case Studies on the Impact...
The Maven dependency graph is an open dataset of Maven Central artifacts, their dependencies, as wel...
The Maven Dependency Dataset contains the data as described in the paper "Mining Metrics, Changes an...
Disclaimer: This is a DRAFT document that does not represent an official position of The MITRE Corpo...
These file is supplementary file for article "Increased Leaf Bacterial Network Complexity along the ...
The threat of attack by computer viruses is in reality a very small part of a much more general thre...
<p>The node attack vulnerability of the real networks analyzed in this paper.</p
International audienceThis article was submitted without an abstract, please refer to the full-text ...
This document is the compilation of the three threat reports that were producedindependently by the ...
This dataset relates to the publication: "Groundwater-dependent ecosystems at risk – global hot...
This is the method file for Making waves: Topic modeling discovers trending topics in global researc...
Harmful algal blooms (HABs) produce local impacts in nearly all freshwater and marine systems. They ...