Zobrazeno 1 - 10
of 6 596
pro vyhledávání: '"So, Kalu"'
Autor:
Schorlemmer, Taylor R., Burmane, Ethan H., Kalu, Kelechi G., Torres-Arias, Santiago, Davis, James C.
Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signat
Externí odkaz:
http://arxiv.org/abs/2407.03949
Many software products are composed by the recursive integration of components from other teams or external parties. Each additional link in a software product's supply chain increases the risk of the injection of malicious behavior. To improve suppl
Externí odkaz:
http://arxiv.org/abs/2406.08198
Autor:
Schorlemmer, Taylor R, Kalu, Kelechi G, Chigges, Luke, Ko, Kyung Myung, Isghair, Eman Abu, Baghi, Saurabh, Torres-Arias, Santiago, Davis, James C
Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software si
Externí odkaz:
http://arxiv.org/abs/2401.14635
Autor:
Victor A. Alegana, Johnson M. Ticha, Jason M. Mwenda, Reggis Katsande, Marta Gacic-Dobo, Maria Carolina Danovaro-Holliday, Charles W. Shey, Kalu A. Akpaka, Lawrence N. Kazembe, Benido Impouma
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-11 (2024)
Abstract Universal access to childhood vaccination is important to child health and sustainable development. Here we identify, at a fine spatial scale, under-immunized children and zero-dose children. Using Chad, as an example, the most recent nation
Externí odkaz:
https://doaj.org/article/f5693d4f8aab4648bc32677f8f79b663
Publikováno v:
Fixed Point Theory and Algorithms for Sciences and Engineering, Vol 2024, Iss 1, Pp 1-20 (2024)
Abstract Let Ω be a nonempty closed convex subset of a real Hilbert space H $\mathfrak{H}$ . Let ℑ be a nonspreading mapping from Ω into itself. Define two sequences { ψ n } n = 1 ∞ $\{\psi _{{n}}\}_{n=1}^{\infty}$ and { ϕ n } n = 1 ∞ $\{\p
Externí odkaz:
https://doaj.org/article/20d8a75a32e643ce9c866544dd367a30
Autor:
Kalu, Kelechi G., Schorlemmer, Taylor R., Chen, Sophie, Robinson, Kyle, Kocinare, Erik, Davis, James C.
The primary theory of software engineering is that an organization's Policies and Processes influence the quality of its Products. We call this the PPP Theory. Although empirical software engineering research has grown common, it is unclear whether r
Externí odkaz:
http://arxiv.org/abs/2308.12387
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures
Autor:
Singla, Tanmay, Anandayuvaraj, Dharun, Kalu, Kelechi G., Schorlemmer, Taylor R., Davis, James C.
As we increasingly depend on software systems, the consequences of breaches in the software supply chain become more severe. High-profile cyber attacks like those on SolarWinds and ShadowHammer have resulted in significant financial and data losses,
Externí odkaz:
http://arxiv.org/abs/2308.04898
Autor:
Kalu, Chikezie Kennedy, author, Döngül, Esra Sipahi, author
Publikováno v:
VUCA and Other Analytics in Business Resilience, Part A
Publikováno v:
Discover Geoscience, Vol 2, Iss 1, Pp 1-21 (2024)
Abstract Mapping of the subsurface is a vital procedure during construction. It enhances hazard zonation, planning and protection of engineering structures. The present study centres on an area susceptible to foundation instability and building colla
Externí odkaz:
https://doaj.org/article/287c492c79974746b72ff9a8cdbf60e6
Publikováno v:
Journal of Electrical Systems and Information Technology, Vol 11, Iss 1, Pp 1-25 (2024)
Abstract Hotspots in electrical power equipment or installations are a major issue whenever it occurs within the power system. Factors responsible for this phenomenon are many, sometimes inter-related and other times they are isolated. Electrical hot
Externí odkaz:
https://doaj.org/article/f6002b356d034a73863b737d71c5b7fb