Searched for: subject%3A%22Dependency%255C+analysis%22
(1 - 9 of 9)
document
Rębacz, Mateusz (author)
Open Source developers typically use Git repositories to transparently store the source code of projects and contribute to the code of others. There are millions of repositories actively hosted on platforms such as GitHub. This presents an opportunity for sharing knowledge between related projects – the so-called digital siblings. Finding...
bachelor thesis 2024
document
Brands, Anna (author)
In (open-source) development, developers routinely rely on other libraries to improve their coding efficiency by reusing code. This reliance on other packages could cause issues when critical dependencies have suddenly have a vulnerability introduced to them. This work analyzes the criticality for NPM. To get an accurate picture of what the most...
bachelor thesis 2022
document
Corlade, Denis (author)
Developers rely on different software to improve their efficiency as to reuse parts of code and be able to maintain it with ease, which is why open source software libraries have gained much pop- ularity over the past years. This paper analyzes what are the most used packages from Apache Maven, which is a build automation tool used primarily for...
bachelor thesis 2022
document
Sarisen, Dondu (author), Koukoravas, Vasilis (author), Farmani, Raziyeh (author), Kapelan, Z. (author), Memon, Fayyaz Ali (author)
Intermittent water supply (IWS) is widely used around the world, and with the increase in population and predicted future water scarcity, IWS applications seem to continue. While most of the existing studies on water supply concentrate on continuous water supply (CWS), the research focused on the IWS is now becoming mainstream. Hydraulic...
review 2022
document
Nguyen, Jakub (author)
Nowadays software development greatly relies upon using third-party source code. A logical consequence is that vulnerabilities from such sources can be propagated to applications making use of those. Tools like Dependabot can alert developers about packages they use, which entail vulnerabilities. Such alerts oftentimes turn out to be false...
bachelor thesis 2021
document
Mook, Niels (author)
Software reuse in the form of dependencies has become widespread in software development. However, dependencies have the potential to suffer from vulnerabilities, thereby potentially putting depending projects at risk. Dependency analysis software can be used to manage vulnerable dependencies, such as Dependabot. Yet, such programs are generally...
bachelor thesis 2021
document
Popovici, Tudor (author)
Modern software development involves the usage of external third-party software projects as direct dependencies. Nonetheless, developers of a dependant project have no control over critical aspects such as development and testing of the dependency. This can put the reliant repositories at risk through vulnerabilities, which can be exploited by...
bachelor thesis 2021
document
Abrishami, S. (author), Khakzad, N. (author), Hosseini, Seyed Mahmoud (author), van Gelder, P.H.A.J.M. (author)
Success Likelihood Index Model (SLIM) is one of the widely-used deterministic techniques in human reliability assessment especially when data is insufficient. However, this method suffers from epistemic uncertainty as it extremely relies on expert judgment for determining the model parameters such as the rates and weights of the performance...
journal article 2020
document
Held, P.C. (author)
doctoral thesis 1996
Searched for: subject%3A%22Dependency%255C+analysis%22
(1 - 9 of 9)