A new method to construct the software vulnerability model | IEEE Conference Publication | IEEE Xplore