1. Cyberattacks: Why, what, who, and how;Liu;IT Professional,2009
2. Have Australian websites staunched “catastrophic” Heartbleed risk?;Reilly,2014
3. Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista;Zimmermann,2010
4. Predicting vulnerable software components;Neuhaus,2007
5. Predicting vulnerable components: Software metrics vs text mining;Walden,2014