You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: master-thesis.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,9 @@ Software Composition Analysis (SCA) tools scan a project's dependencies to ident
24
24
25
25
Related Work:
26
26
27
-
[1][Software composition analysis for vulnerability detection: An empirical study on Java projects](dl.acm.org/doi/abs/10.1145/3611643.3616299)
27
+
[1][Software composition analysis for vulnerability detection: An empirical study on Java projects](https://dl.acm.org/doi/abs/10.1145/3611643.3616299)
28
28
29
-
[2][Understanding Similarities and Differences Between Software Composition Analysis Tools](ieeexplore.ieee.org/abstract/document/10645968)
29
+
[2][Understanding Similarities and Differences Between Software Composition Analysis Tools](https://ieeexplore.ieee.org/abstract/document/10645968)
30
30
31
31
[3][Adversarial Analysis of Software Composition Analysis Tools](https://link.springer.com/chapter/10.1007/978-3-031-75764-8_9)
0 commit comments