Author of the publication

Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies.

, and . candar, page 210-216. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Risk Indicator for Open Source Software to Measure Software Development Status., , , , and . WISA, volume 14402 of Lecture Notes in Computer Science, page 143-156. Springer, (2023)Low pass filter-less pulse width controlled PLL with zero phase offset using pulse width accumulator., , and . ICECS, page 625-628. IEEE, (2013)3D Shape from Silhouettes in Water for Online Novel-view Synthesis., , and . IPSJ Trans. Comput. Vis. Appl., (2013)Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation., , , and . CoRR, (2020)A Gate Delay Mismatch Tolerant Time-Mode Analog Accumulator Using a Delay Line Ring., , , and . IEICE Trans. Electron., 100-C (9): 736-745 (2017)Constructing a Network Graph of File Tracking Results Against Information Leakage., , and . AsiaJCIS, page 8-15. IEEE, (2022)A calibration-free time difference accumulator using two pulses propagating on a single buffer ring., , , and . A-SSCC, page 1-4. IEEE, (2015)File Tracking and Visualization Methods Using a Network Graph to Prevent Information Leakage., , and . IEICE Trans. Inf. Syst., 106 (9): 1339-1353 (September 2023)Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies., and . candar, page 210-216. IEEE, (2023)