Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem
Third-party libraries with rich functionalities facilitate the fast development of JavaScript
software, leading to the explosive growth of the NPM ecosystem. However, it also brings …
software, leading to the explosive growth of the NPM ecosystem. However, it also brings …
Practical automated detection of malicious npm packages
The npm registry is one of the pillars of the JavaScript and Type-Script ecosystems, hosting
over 1.7 million packages ranging from simple utility libraries to complex frameworks and …
over 1.7 million packages ranging from simple utility libraries to complex frameworks and …
Research directions in software supply chain security
Reusable software libraries, frameworks, and components, such as those provided by open-
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …
On the impact of security vulnerabilities in the npm and RubyGems dependency networks
The increasing interest in open source software has led to the emergence of large language-
specific package distributions of reusable software libraries, such as npm and RubyGems …
specific package distributions of reusable software libraries, such as npm and RubyGems …
Towards understanding third-party library dependency in c/c++ ecosystem
Third-party libraries (TPLs) are frequently reused in software to reduce development cost
and the time to market. However, external library dependencies may introduce …
and the time to market. However, external library dependencies may introduce …
Challenges of producing software bill of materials for java
Software bills of materials (SBOMs) promise to become the backbone of software supply
chain hardening. We deep-dive into six tools and the SBOMs they produce for complex open …
chain hardening. We deep-dive into six tools and the SBOMs they produce for complex open …
On the use of dependabot security pull requests
Vulnerable dependencies are a major problem in modern software development. As
software projects depend on multiple external dependencies, developers struggle to …
software projects depend on multiple external dependencies, developers struggle to …
Software supply chain: review of attacks, risk assessment strategies and security controls
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …
software supply chain as a distribution vector. As the reliance of software projects on open …
Circular systems engineering
The perception of the value and propriety of modern engineered systems is changing. In
addition to their functional and extra-functional properties, nowadays' systems are also …
addition to their functional and extra-functional properties, nowadays' systems are also …
Malicious package detection in NPM and pypi using a single model of malicious behavior sequence
Open-source software (OSS) supply chain enlarges the attack surface, which makes
package registries attractive targets for attacks. Recently, package registries NPM and PyPI …
package registries attractive targets for attacks. Recently, package registries NPM and PyPI …