1. Allodi, L., & Massacci, F. (2014). Comparing vulnerability severity and exploits using case-control studies. Journal of ACM Transactions on Information and System Security (TISSEC), 17(1), 1–20.
2. More Secure Software. (2016).
https://www.microsoft.com/en-us/sdl/about/benefits.aspx
. Accessed 21 Feb 2017.
3. Mouzarani, M., Sadeghiyan, B., & Zolfaghari, M. (2016). A smart fuzzing method for detecting heap-based vulnerabilities in executable codes. Journal of Security and Communication Networks, 9(18), 5098–5115.
4. Ransbotham, S., & Mitra, S. (2013). The impact of immediate disclosure on attack diffusion and volume. In B. Schneier (Ed.), Economics of Information Security and Privacy III (pp. 1–12). New York, NY: Springer.
5. Chen, T., Zhang, X-s, Zhu, C., Ji, X-l, Guo, S-z, & Yue, W. (2013). Design and implementation of a dynamic symbolic execution tool for windows executables. Journal of Software: Evolution and Process,
25(12), 1249–1272.