Results 11 to 20 of about 163,972 (294)

NPM promotes hepatotoxin-induced fibrosis by inhibiting ROS-induced apoptosis of hepatic stellate cells and upregulating lncMIAT-induced TGF-β2

open access: yesCell Death and Disease, 2023
Liver fibrosis is caused by a variety of chronic liver injuries and has caused significant morbidity and mortality in the world with increasing tendency.
Xue Ding   +12 more
doaj   +2 more sources

NPM reconsidered: towards the study of enduring forms of NPM

open access: yesPublic Management Review
In this introduction to the special issue ‘The New Public Management: Dead or still alive and co-existing? State of play at 40+’ we suggest that we are witnessing two principal developments when it comes to NPM: its endurance in practice and reconsideration in theory.
Sorin Dan, Per Lægreid, David Špaček
openaire   +3 more sources

NPM and NPM-MLF1 interact with chromatin remodeling complexes and influence their recruitment to specific genes.

open access: yesPLoS Genetics, 2019
Nucleophosmin (NPM1) is frequently mutated or subjected to chromosomal translocation in acute myeloid leukemia (AML). NPM protein is primarily located in the nucleus, but the recurrent NPMc+ mutation, which creates a nuclear export signal, is ...
Anaïs Darracq   +6 more
doaj   +2 more sources

Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem [PDF]

open access: yesInternational Conference on Software Engineering, 2022
Third-party libraries with rich functionalities facilitate the fast development of JavaScript software, leading to the explosive growth of the NPM ecosystem.
Chengwei Liu   +5 more
semanticscholar   +1 more source

Practical Automated Detection of Malicious npm Packages [PDF]

open access: yesInternational Conference on Software Engineering, 2022
The npm registry is one of the pillars of the JavaScript and Type-Script ecosystems, hosting over 1.7 million packages ranging from simple utility libraries to complex frameworks and entire applications.
Adriana Sejfia, Max Schäfer
semanticscholar   +1 more source

What are Weak Links in the npm Supply Chain? [PDF]

open access: yes2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2021
Modern software development frequently uses third-party packages, raising the concern of supply chain security attacks. Many attackers target popular package managers, like npm, and their users with supply chain attacks.
Nusrat Zahan   +5 more
semanticscholar   +1 more source

On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI [PDF]

open access: yesAsia-Pacific Computer Systems Architecture Conference, 2023
Current software supply chains heavily rely on open-source packages hosted in public repositories. Given the popularity of ecosystems like npm and PyPI, malicious users started to spread malware by publishing open-source packages containing malicious ...
Piergiorgio Ladisa   +4 more
semanticscholar   +1 more source

Killing Two Birds with One Stone: Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence [PDF]

open access: yesACM Transactions on Software Engineering and Methodology, 2023
Open source software (OSS) supply chain enlarges the attack surface of a software system, which makes package registries attractive targets for attacks. Recently, multiple package registries have received intensified attacks with malicious packages.
Junan Zhang   +6 more
semanticscholar   +1 more source

Containing Malicious Package Updates in npm with a Lightweight Permission System [PDF]

open access: yesInternational Conference on Software Engineering, 2021
The large amount of third-party packages available in fast-moving software ecosystems, such as Node.js/npm, enables attackers to compromise applications by pushing malicious updates to their package dependencies.
G. Ferreira   +3 more
semanticscholar   +1 more source

A Survey on Common Threats in npm and PyPi Registries [PDF]

open access: yesDeployable Machine Learning for Security Defense, 2021
Software engineers regularly use JavaScript and Python for both front-end and back-end automation tasks. On top of JavaScript and Python, there are several frameworks to facilitate automation tasks further.
Berkay Kaplan, J. Qian
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy