Data-driven software security: Models and methods

   Abstract