1. Economics of malware: security decisions, incentives and externalities, OECD science;van Eeten;Technol Ind Work Pap,2008
2. Common Vulnerabilities and Exposures;Stand Inf Secur Vulnerab Names,2017
3. National Vulnerability Database, automating vulnerability management;Secur Measur Compl Check,2017
4. Williams L., Gegick M., Vouk M., Predictive models for identifying software components prone to failure during security attacks, (2008).
5. Information systems success: the quest for the independent variables;Petter;J Manag Inf Syst,2013