Latest version: v2.1.5
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Implements binscatter methods, including partition selection, point estimation, pointwise and uniform inference methods, and graphical procedures.
No known vulnerabilities found
Has known vulnerabilities