1. Bagheri, E., & Gasevic, D. (2010). Assessing the maintainability of software product line feature models using structural metrics. Software Quality Journal, 19(3), 579–612.
2. Bellovin, S. M. (2006). On the brittleness of software and the infeasibility of security metrics. IEEE Security &Privacy, 4(4), 96.
3. Bodeau, D. (2001). Information assurance assessment: Lessons-learned and challenges. In Proceedings of WISSRR 2001, Williamsburg, VA.
4. Bulut, E., Khadraoui, D., & Marquet, B. (2007). Multi-agent based security assurance monitoring system for telecommunication infrastructures. In Proceedings of the communication, network, and information security conference, Berkeley, California. Anaheim, CA, USA: ACTA Press.
5. Chaula, J. A., Yngström, L., & Kowalski, S. (2005). Security metrics and evaluation of information systems security. In Proceedings of the 4th annual conference on information security for South Africa (pp. 1–11). Pretoria, South Africa: ISSA.