{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:49:06Z","timestamp":1761709746577,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588106"},{"type":"electronic","value":"9783030588113"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58811-3_62","type":"book-chapter","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T08:04:50Z","timestamp":1601280290000},"page":"877-893","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Cross-Project Vulnerability Prediction Based on Software Metrics and Deep Learning"],"prefix":"10.1007","author":[{"given":"Ilias","family":"Kalouptsoglou","sequence":"first","affiliation":[]},{"given":"Miltiadis","family":"Siavvas","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tsoukalas","sequence":"additional","affiliation":[]},{"given":"Dionysios","family":"Kehagias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"62_CR1","unstructured":"ISO\/IEC: ISO\/IEC 25010 - Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models. ISO\/IEC (2011)"},{"key":"62_CR2","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-319-01604-7_36","volume-title":"Information Sciences and Systems 2013","author":"E Gelenbe","year":"2013","unstructured":"Gelenbe, E., et al.: NEMESYS: enhanced network security for seamless service provisioning in the smart mobile ecosystem. In: Gelenbe, E., Lent, R. (eds.) Information Sciences and Systems 2013, pp. 369\u2013378. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-01604-7_36"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Siavvas, M., Gelenbe, E., Kehagias, D.: Static analysis-based approaches for secure software development. In: Security in Computer and Information Sciences, p. 142 (2018)","DOI":"10.1007\/978-3-319-95189-8_13"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2017.02.003","volume":"53","author":"L Kumar","year":"2017","unstructured":"Kumar, L., Misra, S., Rath, S.K.: An empirical analysis of the effectiveness of software metrics and fault prediction model for identifying faulty classes. Comput. Stand. Interfaces 53, 1\u201332 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"62_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-13-2348-5_5","volume-title":"Towards Extensible and Adaptable Methods in Computing","author":"S Shukla","year":"2018","unstructured":"Shukla, S., Behera, R.K., Misra, S., Rath, S.K.: Software reliability assessment using deep learning technique. In: Chakraverty, S., Goel, A., Misra, S. (eds.) Towards Extensible and Adaptable Methods in Computing, pp. 57\u201368. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2348-5_5"},{"issue":"6","key":"62_CR6","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber, S.R., Kemerer, C.F.: A metrics suite for object oriented design. IEEE Trans. Softw. Eng. 20(6), 476\u2013493 (1994)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"62_CR7","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1049\/iet-sen.2011.0206","volume":"6","author":"S Misra","year":"2012","unstructured":"Misra, S., Akman, I., Colomo-Palacios, R.: Framework for evaluation and validation of software complexity measures. IET Softw. 6(4), 323\u2013334 (2012)","journal-title":"IET Softw."},{"key":"62_CR8","doi-asserted-by":"publisher","first-page":"8782","DOI":"10.1109\/ACCESS.2018.2791344","volume":"6","author":"S Misra","year":"2018","unstructured":"Misra, S., Adewumi, A., Fernandez-Sanz, L., Damasevicius, R.: A suite of object oriented cognitive complexity metrics. IEEE Access 6, 8782\u20138796 (2018)","journal-title":"IEEE Access"},{"issue":"10","key":"62_CR9","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato, R., Walden, J., Hovsepyan, A., Joosen, W.: Predicting vulnerable software components via text mining. IEEE Trans. Softw. Eng. 40(10), 993\u20131006 (2014)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"9","key":"62_CR10","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TIFS.2019.2895963","volume":"14","author":"M Zhang","year":"2019","unstructured":"Zhang, M., de Carnavalet, X.D.C., Wang, L., Ragab, A.: Large-scale empirical study of important features indicative of discovered vulnerabilities to assess application security. IEEE Trans. Inf. Forensics Secur. 14(9), 2315\u20132330 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Pang, Y., Xue, X., Wang, H.: Predicting Vulnerable Software Components through Deep Neural Network. In: Proceedings of the 2017 International Conference on Deep Learning Technologies - ICDLT 2017, pp. 6\u201310 (2017)","DOI":"10.1145\/3094243.3094245"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Tang, Y., Zhao, F., Yang, Y., Lu, H., Zhou, Y., Xu, B.: Predicting vulnerable components via text mining or software metrics? An effort-aware perspective. In: IEEE International Conference on Software Quality, Reliability and Security (2015)","DOI":"10.1109\/QRS.2015.15"},{"key":"62_CR13","unstructured":"Yang, J., Ryu, D., Baik, J.: Improving vulnerability prediction accuracy with secure coding standard violation measures. In: 2016 International Conference on Big Data and Smart Computing, BigComp 2016, pp. 115\u2013122 (2016)"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Jimenez, M., Papadakis, M., Traon, Y.L.: Vulnerability prediction models: a case study on the Linux kernel. In: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 1\u201310 (2016)","DOI":"10.1109\/SCAM.2016.15"},{"key":"62_CR15","unstructured":"Dam, H.K., Tran, T., Pham, T.T.M., Ng, S.W., Grundy, J., Ghose, A.: Automatic feature learning for predicting vulnerable software components. IEEE Trans. Software Eng., 1 (2018)"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Walden, J., Stuckman, J., Scandariato, R.: Predicting vulnerable components: software metrics vs text mining. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering, pp. 23\u201333, November 2014","DOI":"10.1109\/ISSRE.2014.32"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Ferenc, R., Heged\u0171s, P., Gyimesi, P., Antal, G., B\u00e1n, D., Gyim\u00f3thy, T.: Challenging machine learning algorithms in predicting vulnerable JavaScript functions. In: Proceedings of the 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (2019)","DOI":"10.1109\/RAISE.2019.00010"},{"key":"62_CR18","doi-asserted-by":"crossref","unstructured":"Siavvas, M., Kehagias, D., Tzovaras, D.: A preliminary study on the relationship among software metrics and specific vulnerability types. In: 2017 International Conference on Computational Science and Computational Intelligence (2017)","DOI":"10.1109\/CSCI.2017.159"},{"key":"62_CR19","doi-asserted-by":"crossref","unstructured":"Tang, Y., Zhao, F., Yang, Y., Lu, H., Zhou, Y., Xu, B.: Predicting vulnerable components via text mining or software metrics? An effort-aware perspective. In: Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, pp. 27\u201336 (2015)","DOI":"10.1109\/QRS.2015.15"},{"key":"62_CR20","doi-asserted-by":"crossref","unstructured":"Jimenez, M., Rwemalika, R., Papadakis, M., Sarro, F., Le Traon, Y., Harman, M.: The importance of accounting for real-world labelling when predicting software vulnerabilities. In: 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019)","DOI":"10.1145\/3338906.3338941"},{"issue":"8","key":"62_CR21","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"62_CR22","unstructured":"de Vries, E., Gilbert, J.: Design and implementation of a PHP compiler front-end. dept. Technical report, TR-2007-47, Trinity College Dublin (2007)"},{"issue":"14","key":"62_CR23","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1016\/j.patrec.2010.03.014","volume":"31","author":"R Genuer","year":"2010","unstructured":"Genuer, R., Poggi, J.M., Tuleau-Malot, C.: Variable selection using random forests. Pattern Recogn. Lett. 31(14), 2225\u20132236 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"62_CR24","unstructured":"Feurer, M., Klein, A., Eggensperger, K., Springenberg, J., Blum, M., Hutter, F.: Efficient and robust automated machine learning. In: Proceedings of the 28th International Conference on Neural Information Processing Systems (NIPS) (2015)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58811-3_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T13:18:52Z","timestamp":1619183932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58811-3_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588106","9783030588113"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58811-3_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}