claim
Using a security contact email or mailing list consisting of project maintainers is the most frequently reported vulnerability management practice among the study participants.

Authors

Sources

Referenced by nodes (1)