//-->
The process of Knowledge Harvesting TM : the key to KM
Snyder, Charles, (2000)
Vulnerability diffusions in software product networks
Kang, Martin, (2023)