Predicting Attack-prone Components | IEEE Conference Publication | IEEE Xplore