Showing 1–13 of 13 results
/ Date/ Name
Dec 25, 2025How Do Agents Perform Code Optimization? An Empirical StudyAug 20, 2025A Guide to Stakeholder Analysis for Cybersecurity ResearchersJan 26, 2024Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing FactorsDec 25, 2024Recommending Pre-Trained Models for IoT DevicesMay 24, 2025ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply ChainMar 1, 2025Why Johnny Adopts Identity-Based Software Signing: A Usability Case Study of SigstoreAug 9, 2023An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security FailuresAug 23, 2023Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software EngineeringJul 4, 2024Establishing Provenance Before Coding: Traditional and Next-Gen Software SigningJun 12, 2024An Industry Interview Study of Software Signing for Supply Chain SecurityOct 6, 2025Why Software Signing (Still) Matters: Trust Boundaries in the Software Supply ChainMar 17, 2026A Longitudinal Study of Usability in Identity-Based Software SigningJan 28, 2026Operationalizing Research Software for Supply Chain Security