1. Basic concepts and taxonomy of dependable and secure computing;Avizienis;IEEE Trans. Depend. Secure Comput.,2004
2. Secure Programming with Static Analysis;Chess,2007
3. Experience report: security vulnerability profiles of mission critical software: empirical analysis of security related bug reports;Goseva-Popstojanova,2017
4. SonarQube. https://www.sonarsource.com/products/sonarqube/., 2023 (Accessed 26 September, 2023).
5. Coverity Static Application Security Testing (SAST). https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html., 2023 (Accessed 26 September, 2023).