1 |
https://nvd.nist.gov/
|
2 |
https://www.mend.io/vulnerability-database/
|
3 |
https://www.first.org/cvss/v3.1/specification-document
|
4 |
Executive Office of the President of U.S. (2021).Improving of Nation's Cybersecurity (Executive Order 14028 of May 12, 2021)
|
5 |
Survey of Existing SBOM Formats and Standards - Version 2021
|
6 |
https://vimeo.com/730359322?utm_campaign=5370367&utm_source=affiliate&utm_channel=affiliate&cjevent=5fd8e2401d2f11ed831e03b10a180512&clickid=5fd8e2401d2f11ed831e03b10a180512
|
7 |
AL SAMMAN, A. B. D. U. L. L. A. H."MODELING FLOSS DEPENDENCIES IN PRODUCTS."
|
8 |
https://cyclonedx.org/docs/1.2/xml
|
9 |
https://github.com/fossology/fossology
|
10 |
https://github.com/tern-tools/tern
|
11 |
https://www.mend.io/open-source-security/
|
12 |
Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM) Second Edition
|
13 |
https://www.synopsys.com/software-integrity/res ources/analyst-reports/open-source-security-risk-analysis.html
|
14 |
https://snyk.io/reports/open-source-security/https://owasp.org/
|
15 |
https://www.csoonline.com/article/3668530/sbomformats-spdx-and-cyclonedx-compared.html
|
16 |
https://github.com/CycloneDX/bom-examples
|
17 |
https://github.com/nexB/scancode-toolkit
|
18 |
Kumar, Subodha, and Rakesh R. Mallipeddi. "Impact of cybersecurity on operations and supply chain management: emerging trends and future re- search directions." Production and Operations Management.
|
19 |
https://www.synopsys.com/software-integrity/security-testing/software-composition-analysis.html
|