[1]
John H. Whitaker, “Enhancing Software Supply Chain Security: Comprehensive Analysis of Vulnerabilities, Dependency Management, and SBOM Strategies”, ijasr, vol. 5, no. 10, pp. 155–161, Oct. 2025, Accessed: Apr. 14, 2026. [Online]. Available: https://sciencebring.com/index.php/ijasr/article/view/1053