Summary
This document will survey existing approaches for predicting the existence of vulnerabilities in software applications and introduce novel vulnerability prediction models
More information & hyperlinks