Citations
The paper
has been cited by the following works.
- S. Amann, S. Beyer,
K. Kevic, and H. Gall.
Software mining studies: Goals, approaches, artifacts, and replicability.
10th LASER Summer School on Software Engineering: Software for the Cloud
and Big Data, LASER 2013–2014, 8987:121–158, 2015.
(doi:10.1007/978-3-319-28406-4_5)
- M. Cadariu,
E. Bouwers, J. Visser, and A. Van Deursen.
Tracking known security vulnerabilities in proprietary software systems.
In 22nd IEEE International Conference on Software Analysis, Evolution,
and Reengineering, SANER 2015, pages 516–519. Institute of Electrical
and Electronics Engineers Inc., 2015.
(doi:10.1109/SANER.2015.7081868)
- S.S. Alqahtani,
E.E. Eghan, and J. Rilling.
Tracing known security vulnerabilities in software repositories — a semantic
web enabled modeling approach.
Science of Computer Programming, 121:153–175, 2016.
(doi:10.1016/j.scico.2016.01.005)
- K. Manikas.
Revisiting software ecosystems research: A longitudinal literature study.
Journal of Systems and Software, 117:84–103, 2016.
(doi:10.1016/j.jss.2016.02.003)
- E. Wittern, P. Suter,
and S. Rajagopalan.
A look at the dynamics of the JavaScript package ecosystem.
In 13th Working Conference on Mining Software Repositories, MSR
2016, pages 351–361. Association for Computing Machinery, Inc, 2016.
(doi:10.1145/2901739.2901743)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.