Publisher
Springer Nature Switzerland
Reference47 articles.
1. Akram, J., Luo, P.: SQVDT: a scalable quantitative vulnerability detection technique for source code security assessment. Softw. Practice Exp. 51(2), 294–318 (2021). https://doi.org/10.1002/spe.2905
2. Alohaly, M., Takabi, H.: When do changes induce software vulnerabilities? In: CIC, pp. 59–66. IEEE (2017). https://doi.org/10.1109/CIC.2017.00020
3. Alves, H., Fonseca, B., Antunes, N.: Software metrics and security vulnerabilities: dataset and exploratory study. In: EDCC, pp. 37–44. IEEE (2016). https://doi.org/10.1109/EDCC.2016.34
4. Aumasson, J.P.: Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press (2017)
5. Baier, C., Katoen, J.P.: Principles of Model Checking. MIT Press (2008)