1. Krsul IV (1998) Software vulnerability analysis. Purdue University, West Lafayette
2. Jie G, Xiao-Hui K, Qiang L (2016) Survey on software vulnerability analysis method based on machine learning. In: 2016 IEEE first international conference on data science in cyberspace (DSC), pp 642–647. IEEE
3. Ghosh AK, O'Connor T, McGraw G (1998) An automated approach for identifying potential vulnerabilities in software. In: Proceedings. 1998 IEEE symposium on security and privacy (Cat. No. 98CB36186), pp 104–114. IEEE
4. Baker DW, Christey SM, Hill WH, Mann DE (1999) The development of a common enumeration of vulnerabilities and exposures. In: Recent advances in intrusion detection, vol 7, p 9
5. Bishop M (1999) Vulnerabilities analysis. In: Proceedings of the recent advances in intrusion detection, pp 125–136