There are more than 16 artifacts are depending on security-configuration-2.4.
The following bar chart shows the changes of depended-by-count for various versions of security-configuration among the popular POM artifacts.
The following pie chart shows the ratio of the distribution of various versions of security-configuration in popular projects.You can hover on the pie slice to see the details.
The following table lists the Java libraries for Security and security-configuration.
Library-Version | Depended By Count |
---|---|
security-configuration-2.4 | 10 |
security-configuration-1.1.8 | 6 |