1. Nguyen, V.H., Tran, L.M.S.: Predicting vulnerable software components with dependency graphs. In: Proceedings of the 6th International Workshop on Security Measurements and Metrics, ser. MetriSec 2010, pp. 3:1–3:8. ACM, New York (2010).
http://doi.acm.org/10.1145/1853919.1853923
2. Lecture Notes in Computer Science;HG Gürbüz,2014
3. Yafang, H., Yanzhao, L., Ping, L.: Ssrgm: software strong reliability growth model based on failure loss. In: 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 255–261 (2012)
4. Yanzhao, L., Lei, Z., Ping, L., Yao, Y.: Research of trustworthy software system in the network. In: 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp. 287–294 (2012)
5. Leveson, N.G.: Software safety: why, what, and how. ACM Comput. Surv. 18(2), 125–163 (1986)