claim
Application developers must detect dependencies on vulnerable libraries as soon as possible, assess their impact precisely, and mitigate any potential risk (Ponta et al., 2020).

Authors

Sources

Referenced by nodes (1)