B. Shteiman, How your cms could be breeding security vulnerabili- ties, 2013.

F. Tegawendé, J. Bissyandé, D. Ouoba, A. D. Ahmat, Z. Sawadogo et al., Bootstrapping Software Engineering Training in Developing Countries -Return on Experience at the University of Ouagadougou, In AFRICOMM, 2014.

L. Tan, C. Liu, Z. Li, X. Wang, Y. Zhou et al., Bug characteristics in open source software, Empirical Software Engineering, vol.30, issue.9, pp.1665-1705, 2014.
DOI : 10.1007/s10664-013-9258-8

F. Tegawendé, . Bissyandé, . Laurentréveilì-ere, L. Julia, G. Lawall et al., Diagnosys: automatic generation of a debugging interface to the linux kernel, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineerinh, ASE'2012

F. Tegawendé, . Bissyandé, . Laurentréveilì-ere, L. Julia, G. Lawall et al., Ahead of time static analysis for automatic generation of debugging interfaces to the linux kernel, Automated Software Engineering, pp.1-39

F. Tegawendé, F. Bissyandé, D. Thung, L. Lo, L. Jiang et al., Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Proceedings of the 37th Annual International Computer Software & Applications Conference, COMPSAC'2013, pp.1-10, 2013.

F. Tegawendé, D. Bissyandé, J. Ahmat, G. Ouoba, J. Van-stam et al., Sustainable ict4d in africa: Where do we go from here? In AFRICOMM, pp.95-103, 2013.

V. Moen, A. N. Klingsheim, K. I. , F. Simonsen, and K. Hole, Vulnerabilities in e-governments, International Journal of Electronic Security and Digital Forensics, vol.1, issue.1, pp.89-100, 2007.
DOI : 10.1504/IJESDF.2007.013595

F. Ju-an-wang, M. Zhang, and . Xia, Temporal metrics for software vulnerabilities, Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW '08, pp.1-44, 2008.

R. Paleari, D. Marrone, D. Bruschi, and M. Monga, On Race Vulnerabilities in Web Applications, Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pp.126-142, 2008.
DOI : 10.1007/978-3-540-70542-0_7

H. Shahriar and M. Zulkernine, Mitigating program security vulnerabilities, ACM Computing Surveys, vol.44, issue.3, pp.1-11, 2012.
DOI : 10.1145/2187671.2187673

A. Ciampa, C. A. Visaggio, and M. D. Penta, A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS '10, pp.43-49, 2010.
DOI : 10.1145/1809100.1809107