Zobrazeno 1 - 10
of 6 415
pro vyhledávání: '"Kalu SO"'
Autor:
Schorlemmer, Taylor R., Burmane, Ethan H., Kalu, Kelechi G., Torres-Arias, Santiago, Davis, James C.
Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signat
Externí odkaz:
http://arxiv.org/abs/2407.03949
Many software products are composed by the recursive integration of components from other teams or external parties. Each additional link in a software product's supply chain increases the risk of the injection of malicious behavior. To improve suppl
Externí odkaz:
http://arxiv.org/abs/2406.08198
Publikováno v:
Contextus, Vol 17, Iss 2, Pp 37-62 (2019)
This paper aims at analyzing the existence of wage differentials by genders in the agricultural labor market in the Brazilian rural area, with the purpose of verifying if the differentials are due to differences in explained characteristicsor discrim
Externí odkaz:
https://doaj.org/article/0a5f71366e67484ca64e7d3c27a368d5
Autor:
Schorlemmer, Taylor R, Kalu, Kelechi G, Chigges, Luke, Ko, Kyung Myung, Isghair, Eman Abu, Baghi, Saurabh, Torres-Arias, Santiago, Davis, James C
Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software si
Externí odkaz:
http://arxiv.org/abs/2401.14635
Publikováno v:
Discover Agriculture, Vol 2, Iss 1, Pp 1-14 (2024)
Abstract India has been identified as one of the most susceptible nations to the impacts of climate change. The present study made an attempt to examine the adaptive capacity of farmers living in the Gangetic Plains of India. This study creates an ad
Externí odkaz:
https://doaj.org/article/4efa41f9f0cf41fbb70e50b99ac6a907
Autor:
Victor A. Alegana, Johnson M. Ticha, Jason M. Mwenda, Reggis Katsande, Marta Gacic-Dobo, Maria Carolina Danovaro-Holliday, Charles W. Shey, Kalu A. Akpaka, Lawrence N. Kazembe, Benido Impouma
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-11 (2024)
Abstract Universal access to childhood vaccination is important to child health and sustainable development. Here we identify, at a fine spatial scale, under-immunized children and zero-dose children. Using Chad, as an example, the most recent nation
Externí odkaz:
https://doaj.org/article/f5693d4f8aab4648bc32677f8f79b663
Publikováno v:
Fixed Point Theory and Algorithms for Sciences and Engineering, Vol 2024, Iss 1, Pp 1-20 (2024)
Abstract Let Ω be a nonempty closed convex subset of a real Hilbert space H $\mathfrak{H}$ . Let ℑ be a nonspreading mapping from Ω into itself. Define two sequences { ψ n } n = 1 ∞ $\{\psi _{{n}}\}_{n=1}^{\infty}$ and { ϕ n } n = 1 ∞ $\{\p
Externí odkaz:
https://doaj.org/article/20d8a75a32e643ce9c866544dd367a30
Autor:
Kalu, Kelechi G., Schorlemmer, Taylor R., Chen, Sophie, Robinson, Kyle, Kocinare, Erik, Davis, James C.
The primary theory of software engineering is that an organization's Policies and Processes influence the quality of its Products. We call this the PPP Theory. Although empirical software engineering research has grown common, it is unclear whether r
Externí odkaz:
http://arxiv.org/abs/2308.12387
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures
Autor:
Singla, Tanmay, Anandayuvaraj, Dharun, Kalu, Kelechi G., Schorlemmer, Taylor R., Davis, James C.
As we increasingly depend on software systems, the consequences of breaches in the software supply chain become more severe. High-profile cyber attacks like those on SolarWinds and ShadowHammer have resulted in significant financial and data losses,
Externí odkaz:
http://arxiv.org/abs/2308.04898
Autor:
Kalu, Chikezie Kennedy, author, Döngül, Esra Sipahi, author
Publikováno v:
VUCA and Other Analytics in Business Resilience, Part A