{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:51:05Z","timestamp":1768679465173,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030588106","type":"print"},{"value":"9783030588113","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58811-3_72","type":"book-chapter","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T08:04:50Z","timestamp":1601280290000},"page":"1019-1034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Data-Mining Based Study of Security Vulnerability Types and Their Mitigation in Different Languages"],"prefix":"10.1007","author":[{"given":"G\u00e1bor","family":"Antal","sequence":"first","affiliation":[]},{"given":"Bal\u00e1zs","family":"Mosolyg\u00f3","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"V\u00e1ndor","sequence":"additional","affiliation":[]},{"given":"P\u00e9ter","family":"Heged\u0171s","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"72_CR1","doi-asserted-by":"publisher","unstructured":"Abunadi, I., Alenezi, M.: Towards cross project vulnerability prediction in open source web applications. In: Proceedings of the The International Conference on Engineering MIS 2015, ICEMIS 2015. Association for Computing Machinery, New York (2015). https:\/\/doi.org\/10.1145\/2832987.2833051","DOI":"10.1145\/2832987.2833051"},{"key":"72_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-319-95174-4_32","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2018","author":"RK Behera","year":"2018","unstructured":"Behera, R.K., Shukla, S., Rath, S.K., Misra, S.: Software reliability assessment using machine learning technique. In: Gervasi, O., et al. (eds.) ICCSA 2018. LNCS, vol. 10964, pp. 403\u2013411. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95174-4_32"},{"key":"72_CR3","volume-title":"Introduction to Computer Security","author":"M Bishop","year":"2005","unstructured":"Bishop, M.: Introduction to Computer Security, vol. 50. Addison-Wesley, Boston (2005)"},{"key":"72_CR4","doi-asserted-by":"crossref","unstructured":"Camilo, F., Meneely, A., Nagappan, M.: Do bugs foreshadow vulnerabilities? a study of the chromium project. In: 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories, pp. 269\u2013279 (2015)","DOI":"10.1109\/MSR.2015.32"},{"key":"72_CR5","doi-asserted-by":"crossref","unstructured":"Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, pp. 131\u2013138 (2006)","DOI":"10.1145\/1162666.1162671"},{"key":"72_CR6","doi-asserted-by":"publisher","unstructured":"Kuhn, D., Raunak, M., Kacker, R.: An analysis of vulnerability trends, 2008\u20132016, pp. 587\u2013588, July 2017. https:\/\/doi.org\/10.1109\/QRS-C.2017.106","DOI":"10.1109\/QRS-C.2017.106"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Li, F., Paxson, V.: A large-scale empirical study of security patches. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2201\u20132215 (2017)","DOI":"10.1145\/3133956.3134072"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: A mining approach to obtain the software vulnerability characteristics. In: 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD), pp. 296\u2013301 (2017)","DOI":"10.1109\/CBD.2017.58"},{"issue":"6","key":"72_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MSP.2006.145","volume":"4","author":"P Mell","year":"2006","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system. IEEE Secur. Privacy 4(6), 85\u201389 (2006)","journal-title":"IEEE Secur. Privacy"},{"key":"72_CR10","unstructured":"MITRE Corporation: CVE - Common Vulnerabilities and Exposures (2020). https:\/\/cve.mitre.org\/. Accessed 29 Apr 2020"},{"key":"72_CR11","unstructured":"MITRE Corporation: CWE - Common Weakness Enumeration (2020). https:\/\/cwe.mitre.org\/. Accessed 29 Apr 2020"},{"key":"72_CR12","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1007\/s10664-016-9447-3","volume":"22","author":"N Munaiah","year":"2016","unstructured":"Munaiah, N., Camilo, F., Wigham, W., Meneely, A., Nagappan, M.: Do bugs foreshadow vulnerabilities? an in-depth study of the chromium project. Empirical Softw. Eng. 22, 1305\u20131347 (2016)","journal-title":"Empirical Softw. Eng."},{"key":"72_CR13","doi-asserted-by":"publisher","unstructured":"Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting vulnerable software components. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 529\u2013540. Association for Computing Machinery, New York (2007). https:\/\/doi.org\/10.1145\/1315245.1315311","DOI":"10.1145\/1315245.1315311"},{"key":"72_CR14","doi-asserted-by":"publisher","unstructured":"P\u00e9ter, G., et al.: BugsJS: a benchmark of JavaScript bugs. In: Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp. 90\u2013101. IEEE, April 2019. https:\/\/doi.org\/10.1109\/ICST.2019.00019","DOI":"10.1109\/ICST.2019.00019"},{"issue":"2","key":"72_CR15","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TR.2013.2257052","volume":"62","author":"S Rahimi","year":"2013","unstructured":"Rahimi, S., Zargham, M.: Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database. IEEE Trans. Reliab. 62(2), 395\u2013407 (2013)","journal-title":"IEEE Trans. Reliab."},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Shafiq, M.Z., Liu, A.X.: A large scale exploratory analysis of software vulnerability life cycles. In: 2012 34th International Conference on Software Engineering (ICSE), pp. 771\u2013781 (2012)","DOI":"10.1109\/ICSE.2012.6227141"},{"key":"72_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-13-2348-5_5","volume-title":"Towards Extensible and Adaptable Methods in Computing","author":"S Shukla","year":"2018","unstructured":"Shukla, S., Behera, R.K., Misra, S., Rath, S.K.: Software reliability assessment using deep learning technique. In: Chakraverty, S., Goel, A., Misra, S. (eds.) Towards Extensible and Adaptable Methods in Computing, pp. 57\u201368. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-2348-5_5"},{"key":"72_CR18","doi-asserted-by":"publisher","unstructured":"Sliwerski, J., Zimmermann, T., Zeller, A.: When do changes induce fixes? In: Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR 2005. pp. 1\u20135. Association for Computing Machinery, New York (2005). https:\/\/doi.org\/10.1145\/1083142.1083147","DOI":"10.1145\/1083142.1083147"},{"key":"72_CR19","doi-asserted-by":"publisher","unstructured":"\u015aliwerski, J., Zimmermann, T., Zeller, A.: When do changes induce fixes? In: Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR 2005, pp. 1\u20135. Association for Computing Machinery, New York (2005). https:\/\/doi.org\/10.1145\/1083142.1083147","DOI":"10.1145\/1083142.1083147"},{"key":"72_CR20","unstructured":"U.S. National Institute of Standards and Technology: National Vulnerability Database (2020). https:\/\/nvd.nist.gov\/home. Accessed 29 Apr 2020"},{"key":"72_CR21","unstructured":"Vaidya, R.K., De Carli, L., Davidson, D., Rastogi, V.: Security issues in language-based software ecosystems. arXiv preprint arXiv:1903.02613 (2019)"},{"key":"72_CR22","unstructured":"V\u00e1squez, M.L., Bavota, G., Escobar-Velasquez, C.: An empirical study on android-related vulnerabilities. In: Proceedings of the IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp. 2\u201313 (2017)"},{"key":"72_CR23","doi-asserted-by":"crossref","unstructured":"Wijayasekara, D., Manic, M., Wright, J.L., McQueen, M.: Mining bug databases for unidentified software vulnerabilities. In: 2012 5th International Conference on Human System Interactions, pp. 89\u201396 (2012)","DOI":"10.1109\/HSI.2012.22"},{"key":"72_CR24","unstructured":"Wu, L.L., Xie, B., Kaiser, G.E., Passonneau, R.: Bugminer: Software reliability analysis via data mining of bug reports (2011)"},{"key":"72_CR25","doi-asserted-by":"publisher","unstructured":"Xu, Z., Chen, B., Chandramohan, M., Liu, Y., Song, F.: Spain: security patch analysis for binaries towards understanding the pain and pills. In: Proceedings of the IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 462\u2013472, May 2017. https:\/\/doi.org\/10.1109\/ICSE.2017.49","DOI":"10.1109\/ICSE.2017.49"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58811-3_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T13:32:14Z","timestamp":1619184734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58811-3_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588106","9783030588113"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58811-3_72","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}