{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T01:29:05Z","timestamp":1743730145245,"version":"3.40.3"},"publisher-location":"Cham","reference-count":100,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030681098"},{"type":"electronic","value":"9783030681104"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68110-4_7","type":"book-chapter","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T12:40:53Z","timestamp":1611837653000},"page":"102-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["The Random Neural Network as a Bonding Model for Software Vulnerability Prediction"],"prefix":"10.1007","author":[{"given":"Katarzyna","family":"Filus","sequence":"first","affiliation":[]},{"given":"Miltiadis","family":"Siavvas","sequence":"additional","affiliation":[]},{"given":"Joanna","family":"Doma\u0144ska","sequence":"additional","affiliation":[]},{"given":"Erol","family":"Gelenbe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Ajit, A., Acharya, K., Samanta, A.: A review of convolutional neural networks. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India. pp. 1\u20135. IEEEXpress (2020). https:\/\/doi.org\/10.1109\/ic-ETITE47903.2020.049","DOI":"10.1109\/ic-ETITE47903.2020.049"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Alves, H., Fonseca, B., Antunes, N.: Software metrics and security vulnerabilities: dataset and exploratory study. In: 2016 12th European Dependable Computing Conference (EDCC), pp. 37\u201344 (2016)","DOI":"10.1109\/EDCC.2016.34"},{"issue":"10","key":"7_CR3","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/info10100326","volume":"10","author":"A Amin","year":"2019","unstructured":"Amin, A., Eldessouki, A., Magdy, M.T., Abdeen, N., Hindy, H., Hegazy, I.: Androshield: automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information 10(10), 326 (2019)","journal-title":"Information"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.procs.2018.07.183","volume":"134","author":"O Brun","year":"2018","unstructured":"Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural network for detecting attacks against IoT-connected home environments. Procedia Comput. Sci. 134, 458\u2013463 (2018)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1109\/JSAC.2016.2525518","volume":"34","author":"O Brun","year":"2016","unstructured":"Brun, O., Wang, L., Gelenbe, E.: Big data for autonomic intercontinental overlays. IEEE J. Sel. Areas Commun. 34(3), 575\u2013583 (2016)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-319-67274-8_6","volume-title":"Trends and Applications in Knowledge Discovery and Data Mining","author":"C Catal","year":"2017","unstructured":"Catal, C., Akbulut, A., Ekenoglu, E., Alemdaroglu, M.: Development of a software vulnerability prediction web service based on artificial neural networks. In: Kang, U., Lim, E.-P., Yu, J.X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10526, pp. 59\u201367. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67274-8_6"},{"key":"7_CR7","unstructured":"Computer Emergency Response Team Coordination Center. https:\/\/www.kb.cert.org\/vuls\/ Accessed 05 Aug 2020"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.sysarc.2010.06.003","volume":"57","author":"I Chowdhury","year":"2011","unstructured":"Chowdhury, I., Zulkernine, M.: Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. J. Syst. Architect. 57(3), 294\u2013313 (2011)","journal-title":"J. Syst. Architect."},{"key":"7_CR9","unstructured":"Cisco 2019 Annual Report. (Cisco 2019). https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/annual-report\/cisco-annual-report-2019.pdf Accessed 05 Aug 2020"},{"key":"7_CR10","unstructured":"Cisco Cybersecurity Series 2019. Consumer Privacy Survey. (Cisco 2019). https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/annual-report\/cisco-annual-report-2019.pdf Accessed 05 Aug 2020"},{"key":"7_CR11","unstructured":"CWE Top 25 Most Dangerous Software Errors. https:\/\/cwe.mitre.org\/top25\/archive\/2019\/2019_cwe_top25.html Accessed 05 Aug 2020"},{"key":"7_CR12","unstructured":"Dam, H.K., Tran, T., Pham, T., Ng, S.W., Grundy, J., Ghose, A.: Automatic feature learning for vulnerability prediction. arXiv preprint arXiv:1708.02368 (2017)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Ding, Y., et al.: Poster: Rust SGX SDK: Towards memory safety in intel SGX enclave. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2491\u20132493 (2017)","DOI":"10.1145\/3133956.3138824"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1186778.1186782","volume":"1","author":"S Dobson","year":"2006","unstructured":"Dobson, S., et al.: A survey of autonomic communications. ACM Trans. Auton. Adapt. Syst. (TAAS) 1(2), 223\u2013259 (2006)","journal-title":"ACM Trans. Auton. Adapt. Syst. (TAAS)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Du, X., et al.: Leopard: Identifying vulnerable code for vulnerability assessment through program metrics. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 60\u201371 (2019)","DOI":"10.1109\/ICSE.2019.00024"},{"key":"7_CR16","unstructured":"Enabling Open Innovation & Collaboration | The Eclipse Foundation. https:\/\/www.eclipse.org\/ Accessed 05 Aug 2020"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Evmorfos, S., Vlachodimitropoulos, G., Bakalos, N., Gelenbe, E.: Neural network architectures for the detection of SYN flood attacks in IoT systems. In: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, no. 69, pp. 1\u20134. ACM (2020) https:\/\/doi.org\/10.1145\/3389189.3398000","DOI":"10.1145\/3389189.3398000"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/fi9030034","volume":"9","author":"JM Fourneau","year":"2017","unstructured":"Fourneau, J.M., Gelenbe, E.: G-networks with adders. Future Internet 9(3), 34 (2017)","journal-title":"Future Internet"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Francois, F., Gelenbe, E.: Optimizing secure SDN-enabled inter-data centre overlay networks through cognitive routing. In: 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 283\u2013288. IEEE (2016)","DOI":"10.1109\/MASCOTS.2016.26"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Francois, F., Gelenbe, E.: Towards a cognitive routing engine for software defined networks. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7511138"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-61401-0_8","volume-title":"Artificial Intelligence and Soft Computing","author":"P Fr\u00f6hlich","year":"2020","unstructured":"Fr\u00f6hlich, P., Gelenbe, E.: Optimal fog services placement in SDN IoT network using random neural networks and cognitive network map. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds.) ICAISC 2020. LNCS (LNAI), vol. 12415, pp. 78\u201389. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61401-0_8"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Frohlich, P., Gelenbe, E., Nowak, M.P.: Smart SDN management of fog services. In: GIOTS 2020: Global IoT Summit 2020, IEEE Communications Society, pp. 1\u20135 June 2020, Dubin, Ireland. TechRxiv (2020)","DOI":"10.1109\/GIOTS49054.2020.9119542"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Gegick, M., Williams, L.: Toward the use of automated static analysis alerts for early identification of vulnerability-and attack-prone components. In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp. 18\u201318. IEEE (2007)","DOI":"10.1109\/ICIMP.2007.46"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1162\/neco.1993.5.1.154","volume":"5","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5, 154\u2013164 (1993)","journal-title":"Neural Comput."},{"issue":"10","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/5.537113","volume":"84","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Feng, Y., Krishnan, K.R.R.: Neural network methods for volumetric magnetic resonance imaging of the human brain. Proc. IEEE 84(10), 1488\u20131496 (1996)","journal-title":"Proc. IEEE"},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1162\/neco.1989.1.4.502","volume":"1","author":"E Gelenbe","year":"1989","unstructured":"Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502\u2013510 (1989)","journal-title":"Neural Comput."},{"issue":"2","key":"7_CR27","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1162\/neco.1990.2.2.239","volume":"2","author":"E Gelenbe","year":"1990","unstructured":"Gelenbe, E.: Stability of the random neural network model. Neural Comput. 2(2), 239\u2013247 (1990)","journal-title":"Neural Comput."},{"issue":"3","key":"7_CR28","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1017\/S0269964800002953","volume":"7","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E.: G-networks with signals and batch removal. Probab. Eng. Inf. Sci. 7(3), 335\u2013342 (1993)","journal-title":"Probab. Eng. Inf. Sci."},{"issue":"7","key":"7_CR29","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1538788.1538809","volume":"52","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66\u201375 (2009)","journal-title":"Commun. ACM"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Gelenbe, E.: Machine learning for network routing. In: 2020 9th Mediterranean Conference on Embedded Computing (MECO), pp. 1\u20131. IEEE (2020)","DOI":"10.1109\/MECO49872.2020.9134073"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Domanska, J., Frohlich, P., Nowak, M., Nowak, S.: Self-aware networks that optimize security, Qos and energy. In: Proceedings of the IEEE, accepted for publication, vol. 108 no. 7 (2020)","DOI":"10.1109\/JPROC.2020.2992559"},{"issue":"4","key":"7_CR32","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1162\/089976699300016520","volume":"11","author":"E Gelenbe","year":"1999","unstructured":"Gelenbe, E., Fourneau, J.M.: Random neural networks with multiple classes of signals. Neural Comput. 11(4), 953\u2013963 (1999)","journal-title":"Neural Comput."},{"issue":"2","key":"7_CR33","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.jss.2004.01.016","volume":"74","author":"E Gelenbe","year":"2005","unstructured":"Gelenbe, E., Hussain, K., Kaptan, V.: Simulating autonomous agents in augmented reality. J. Syst. Softw. 74(2), 255\u2013268 (2005)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.jss.2004.01.016","volume":"74","author":"E Gelenbe","year":"2005","unstructured":"Gelenbe, E., Hussain, K., Kaptan, V.: Simulating autonomous agents in augmented reality. J. Syst. Softw. 74(3), 255\u2013268 (2005)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"7_CR35","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/36.823897","volume":"38","author":"E Gelenbe","year":"2000","unstructured":"Gelenbe, E., Ko\u00e7ak, T.: Area-based results for mine detection. IEEE Trans. Geosci. Remote Sens. 38(1), 12\u201324 (2000)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"9","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1109\/JPROC.2004.832952","volume":"92","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and Qos. Proc. IEEE 92(9), 1478\u20131489 (2004)","journal-title":"Proc. IEEE"},{"issue":"6","key":"7_CR37","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/S1389-1286(01)00253-5","volume":"37","author":"E Gelenbe","year":"2001","unstructured":"Gelenbe, E., Lent, R., Xu, Z.: Measurement and performance of a cognitive packet network. Comput. Netw. 37(6), 691\u2013701 (2001)","journal-title":"Comput. Netw."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Liu, P., Laine, J.: Genetic algorithms for route discovery. IEEE Trans. Syst. Man Cybern. Part B (Cybernetics) 36(6), 1247\u20131254 (2006)","DOI":"10.1109\/TSMCB.2006.873213"},{"issue":"5","key":"7_CR39","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.comnet.2006.09.009","volume":"51","author":"E Gelenbe","year":"2007","unstructured":"Gelenbe, E., Loukas, G.: A self-aware approach to denial of service defence. Comput. Netw. 51(5), 1299\u20131314 (2007)","journal-title":"Comput. Netw."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Montuori, A., Nunez, A., Lent, R., Xu, Z.: Experiments with Qos driven learning packet networks. Internet Process Coordination, CRC Press, Boca Raton, pp. 215\u2013233 (2020)","DOI":"10.1201\/9781003072492-17"},{"key":"7_CR41","unstructured":"Gelenbe, E., Sungur, M., Cramer, C.: Learning random networks for compression of still and moving images. JPL: A Decade of Neural Networks; Practical Applications and Prospects, pp. 171\u2013189 (1994)"},{"issue":"12","key":"7_CR42","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1016\/j.camwa.2012.03.056","volume":"64","author":"E Gelenbe","year":"2012","unstructured":"Gelenbe, E., Wu, F.J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869\u20133880 (2012)","journal-title":"Comput. Math. Appl."},{"issue":"3","key":"7_CR43","doi-asserted-by":"publisher","first-page":"336","DOI":"10.3390\/fi5030336","volume":"5","author":"E Gelenbe","year":"2013","unstructured":"Gelenbe, E., Wu, F.J.: Future research on cyber-physical emergency management systems. Future Internet 5(3), 336\u2013354 (2013)","journal-title":"Future Internet"},{"key":"7_CR44","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-67792-7_1","volume-title":"Man-Machine Interactions 5","author":"E Gelenbe","year":"2018","unstructured":"Gelenbe, E., Yin, Y.: Deep learning with dense random neural networks. In: Gruca, A., Czach\u00f3rski, T., Harezlak, K., Kozielski, S., Piotrowska, A. (eds.) Gelenbe, E., Yin, Y.: Deep learning with dense random neural networks. In: International Conference on Man-Machine Interactions. pp. 3\u201318. Springer, Cham (2017). AISC, vol. 659, pp. 3\u201318. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-67792-7_1"},{"key":"7_CR45","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.artint.2019.07.004","volume":"275","author":"Z He","year":"2019","unstructured":"He, Z., Chen, W., Li, Z., Zhang, W., Shao, H., Zhang, M.: Syntax-aware entity representations for neural relation extraction. Artif. Intell. 275, 602\u2013617 (2019)","journal-title":"Artif. Intell."},{"issue":"3","key":"7_CR46","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1017\/S0269964816000073","volume":"30","author":"K Hussain","year":"2016","unstructured":"Hussain, K., Moussa, G.: On-road vehicle classification based on random neural network and bag-of-visual words. Probab. Eng. Inf. Sci. 30(3), 403\u2013412 (2016)","journal-title":"Probab. Eng. Inf. Sci."},{"key":"7_CR47","doi-asserted-by":"publisher","unstructured":"Hussain, K., Yousef, M., Gelenbe, E.: Accurate and energy-efficient classification with spiking random neural network. Probab. Eng. Inf. Sci., 1\u201311 (2019). https:\/\/doi.org\/10.1017\/S0269964819000147","DOI":"10.1017\/S0269964819000147"},{"issue":"2","key":"7_CR48","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TITS.2012.2226239","volume":"14","author":"KF Hussain","year":"2013","unstructured":"Hussain, K.F., Radwan, E., Moussa, G.S.: Augmented reality experiment: Drivers\u2019 behavior at an unsignalized intersection. IEEE Trans. Intell. Trans. Syst. 14(2), 608\u2013617 (2013)","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"7_CR49","unstructured":"IntelliJ IDEA: The Java IDE for Professional Developers by JetBrains. https:\/\/www.jetbrains.com\/idea\/ Accessed 05 Aug 2020"},{"key":"7_CR50","first-page":"1","volume":"2018","author":"KA Jackson","year":"2018","unstructured":"Jackson, K.A., Bennett, B.T.: Locating SQL injection vulnerabilities in java byte code using natural language techniques. SoutheastCon 2018, 1\u20135 (2018)","journal-title":"SoutheastCon"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Jimenez, M., Papadakis, M., Le Traon, Y.: Vulnerability prediction models: A case study on the linux kernel. In: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 1\u201310 (2016)","DOI":"10.1109\/SCAM.2016.15"},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Kaptan, V., Gelenbe, E.: Fusing terrain and goals: agent control in urban environments. In: Multisensor, Multisource Information Fusion: Architectures, Algorithms, and Applications 2006. vol. 6242, p. 624208. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.666720"},{"key":"7_CR53","unstructured":"Keras Functional API. https:\/\/keras.io\/guides\/functional_api\/ Accessed 06 Aug 2020"},{"key":"7_CR54","doi-asserted-by":"crossref","unstructured":"Klees, G., Ruef, A., Cooper, B., Wei, S., Hicks, M.: Evaluating fuzz testing. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2123\u20132138 (2018)","DOI":"10.1145\/3243734.3243804"},{"issue":"1","key":"7_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-019-13056-x","volume":"10","author":"D Kobak","year":"2019","unstructured":"Kobak, D., Berens, P.: The art of using t-SNE for single-cell transcriptomics. Nature Commun. 10(1), 1\u201314 (2019)","journal-title":"Nature Commun."},{"key":"7_CR56","doi-asserted-by":"crossref","unstructured":"Kudjo, P.K., Chen, J., Zhou, M., Mensah, S., Huang, R.: Improving the accuracy of vulnerability report classification using term frequency-inverse gravity moment. In: 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS), pp. 248\u2013259 (2019)","DOI":"10.1109\/QRS.2019.00041"},{"key":"7_CR57","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ins.2020.05.062","volume":"535","author":"M Lan","year":"2020","unstructured":"Lan, M., Zhang, Y., Zhang, L., Du, B.: Global context based automatic road segmentation via dilated convolutional neural network. Inf. Sci. 535, 156\u2013171 (2020)","journal-title":"Inf. Sci."},{"key":"7_CR58","unstructured":"Li, Z., Yang, W., Peng, S., Liu, F.: A survey of convolutional neural networks: Analysis, applications, and prospects (2020)"},{"key":"7_CR59","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Vuldeepecker: A deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681 (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"7_CR60","doi-asserted-by":"publisher","first-page":"92009","DOI":"10.1109\/ACCESS.2019.2927092","volume":"7","author":"J Liu","year":"2019","unstructured":"Liu, J., Li, Q., Yang, H., Han, Y., Jiang, S., Chen, W.: Sequence fault diagnosis for PEMFC water management subsystem using deep learning with t-SNE. IEEE Access 7, 92009\u201392019 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"7_CR61","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(13)70045-9","volume":"2013","author":"S Moshtari","year":"2013","unstructured":"Moshtari, S., Sami, A., Azimi, M.: Using complexity metrics to improve software security. Comput. Fraud Secur. 2013(5), 8\u201317 (2013)","journal-title":"Comput. Fraud Secur."},{"key":"7_CR62","doi-asserted-by":"publisher","first-page":"110491","DOI":"10.1016\/j.jss.2019.110491","volume":"162","author":"KW Nafi","year":"2020","unstructured":"Nafi, K.W., Roy, B., Roy, C.K., Schneider, K.A.: A universal cross language software similarity detector for open source software categorization. J. Syst. Softw. 162, 110491 (2020)","journal-title":"J. Syst. Softw."},{"key":"7_CR63","doi-asserted-by":"crossref","unstructured":"Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting vulnerable software components. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 529\u2013540 (2007)","DOI":"10.1145\/1315245.1315311"},{"issue":"6","key":"7_CR64","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1093\/comjnl\/bxm066","volume":"50","author":"G \u00d6ke","year":"2007","unstructured":"\u00d6ke, G., Loukas, G.: A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J. 50(6), 717\u2013727 (2007)","journal-title":"Comput. J."},{"key":"7_CR65","doi-asserted-by":"crossref","unstructured":"Oke, G., Loukas, G., Gelenbe, E.: Detecting denial of service attacks with bayesian classifiers and the random neural network. In: 2007 IEEE International Fuzzy Systems Conference, pp. 1\u20136. IEEE (2007)","DOI":"10.1109\/FUZZY.2007.4295666"},{"key":"7_CR66","unstructured":"Open Web Application Security Project (OWASP). https:\/\/owasp.org\/ Accessed 05 Aug 2020"},{"key":"7_CR67","unstructured":"OWASP Secure Coding Practices Quick Reference Guide. https:\/\/owasp.org\/www-pdf-archive\/OWASP_SCP_Quick_Reference_Guide_v1.pdf Accessed 05 Aug 2020"},{"key":"7_CR68","unstructured":"OWASP Top Ten. https:\/\/owasp.org\/www-project-top-ten\/ Accessed 05 Aug 2020"},{"key":"7_CR69","doi-asserted-by":"crossref","unstructured":"Pang, Y., Xue, X., Wang, H.: Predicting vulnerable software components through deep neural network. In: Proceedings of the 2017 International Conference on Deep Learning Technologies, pp. 6\u201310 (2017)","DOI":"10.1145\/3094243.3094245"},{"issue":"4","key":"7_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2990499","volume":"16","author":"A Saeed","year":"2016","unstructured":"Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Intelligent intrusion detection in low-power IoTs. ACM Trans. Internet Technol. (TOIT) 16(4), 1\u201325 (2016)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"3","key":"7_CR71","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2005.77","volume":"3","author":"C Salka","year":"2005","unstructured":"Salka, C.: Programming languages and systems security. IEEE Secur. Priv. 3(3), 80\u201383 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR72","unstructured":"Information Security Training - SANS Cyber Security Certifications & Research. https:\/\/www.sans.org\/ Accessed 05 Aug 2020"},{"key":"7_CR73","doi-asserted-by":"crossref","unstructured":"Scalabrino, S., Grano, G., Di Nucci, D., Oliveto, R., De Lucia, A.: Search-based testing of procedural programs: iterative single-target or multi-target approach? In: International Symposium on Search Based Software Engineering, pp. 64\u201379 (2016)","DOI":"10.1007\/978-3-319-47106-8_5"},{"issue":"10","key":"7_CR74","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato, R., Walden, J., Hovsepyan, A., Joosen, W.: Predicting vulnerable software components via text mining. IEEE Trans. Softw. Eng. 40(10), 993\u20131006 (2014)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR75","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.neucom.2018.07.101","volume":"396","author":"W Serrano","year":"2020","unstructured":"Serrano, W., Gelenbe, E.: Deep learning clusters in the cognitive packet network. Neurocomputing 396, 406\u2013428 (2020)","journal-title":"Neurocomputing"},{"key":"7_CR76","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.neucom.2018.05.134","volume":"396","author":"W Serrano","year":"2020","unstructured":"Serrano, W., Gelenbe, E., Yin, Y.: The random neural network with deep learning clusters in smart search. Neurocomputing 396, 394\u2013405 (2020)","journal-title":"Neurocomputing"},{"key":"7_CR77","doi-asserted-by":"crossref","unstructured":"Sherriff, M., Heckman, S.S., Lake, M., Williams, L.: Identifying fault-prone files using static analysis alerts through singular value decomposition. In: Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, pp. 276\u2013279 (2007)","DOI":"10.1145\/1321211.1321247"},{"issue":"6","key":"7_CR78","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSE.2010.81","volume":"37","author":"Y Shin","year":"2010","unstructured":"Shin, Y., Meneely, A., Williams, L., Osborne, J.A.: Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE Trans. Softw. Eng. 37(6), 772\u2013787 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR79","doi-asserted-by":"crossref","unstructured":"Siavvas, M., Gelenbe, E., Kehagias, D., Tzovaras, D.: Static analysis-based approaches for secure software development. In: International ISCIS Security Workshop, pp. 142\u2013157 (2018)","DOI":"10.1007\/978-3-319-95189-8_13"},{"key":"7_CR80","unstructured":"SonarQube. https:\/\/www.sonarqube.org\/ Accessed 03 Aug 2020"},{"key":"7_CR81","doi-asserted-by":"crossref","unstructured":"Tang, Y., Zhao, F., Yang, Y., Lu, H., Zhou, Y., Xu, B.: Predicting vulnerable components via text mining or software metrics? an effort-aware perspective. In: 2015 IEEE International Conference on Software Quality, Reliability and Security, pp. 27\u201336 (2015)","DOI":"10.1109\/QRS.2015.15"},{"issue":"4","key":"7_CR82","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen, I.S., Kumar, C.A.: Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J. King Saud Univ. Comput. Inf. Sci. 29(4), 462\u2013472 (2017)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"1","key":"7_CR83","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.neucom.2009.02.023","volume":"73","author":"S Timotheou","year":"2009","unstructured":"Timotheou, S.: A novel weight initialization method for the random neural network. Neurocomputing 73(1), 160\u2013168 (2009)","journal-title":"Neurocomputing"},{"issue":"3","key":"7_CR84","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/comjnl\/bxp032","volume":"53","author":"S Timotheou","year":"2010","unstructured":"Timotheou, S.: The random neural network: a survey. Comput. J. 53(3), 251\u2013267 (2010)","journal-title":"Comput. J."},{"key":"7_CR85","unstructured":"Veracode: State of software security. Technical Report (2016)"},{"key":"7_CR86","unstructured":"Veracode: State of software security, vol. 9, Technical Report (2018)"},{"key":"7_CR87","unstructured":"Veracode. https:\/\/www.veracode.com\/ Accessed 05 Aug 2020"},{"key":"7_CR88","unstructured":"Visual Studio IDE, Code Editor, Azure DevOps, & App Center - Visual Studio. https:\/\/visualstudio.microsoft.com\/ Accessed 05 Aug 2020"},{"key":"7_CR89","doi-asserted-by":"crossref","unstructured":"Walden, J., Stuckman, J., Scandariato, R.: Predicting vulnerable components: software metrics vs text mining. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering, pp. 23\u201333 (2014)","DOI":"10.1109\/ISSRE.2014.32"},{"key":"7_CR90","doi-asserted-by":"crossref","unstructured":"Wang, L., Brun, O., Gelenbe, E.: Adaptive workload distribution for local and remote clouds. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 003984\u2013003988. IEEE (2016)","DOI":"10.1109\/SMC.2016.7844856"},{"key":"7_CR91","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-39207-3_1","volume-title":"Computer Networks","author":"L Wang","year":"2016","unstructured":"Wang, L., Gelenbe, E.: Real-time traffic over the cognitive packet network. In: Gaj, P., Kwiecie\u0144, A., Stera, P. (eds.) CN 2016. CCIS, vol. 608, pp. 3\u201321. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39207-3_1"},{"key":"7_CR92","doi-asserted-by":"crossref","unstructured":"Wang, X., Sun, J., Chen, Z., Zhang, P., Wang, J., Lin, Y.: Towards optimal concolic testing. In: Proceedings of the 40th International Conference on Software Engineering, pp. 291\u2013302 (2018)","DOI":"10.1145\/3180155.3180177"},{"key":"7_CR93","doi-asserted-by":"crossref","unstructured":"Wu, J., Liu, X., Hu, X., Zhu, J.: Popmnet: generating structured pop music melodies using neural networks. Artif. Intell. 286, 103303 (2020)","DOI":"10.1016\/j.artint.2020.103303"},{"key":"7_CR94","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.ins.2019.03.080","volume":"490","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Ma, Y., Liu, J., Du, J., Xing, L.: Self-attention convolutional neural network for improved MR image reconstruction. Inf. Sci. 490, 317\u2013328 (2019)","journal-title":"Inf. Sci."},{"key":"7_CR95","unstructured":"Yin, Y., Gelenbe, E.: A classifier based on spiking random neural network function approximator (2018)"},{"key":"7_CR96","doi-asserted-by":"crossref","unstructured":"Yin, Y., Wang, L., Gelenbe, E.: Multi-layer neural networks for quality of service oriented server-state classification in cloud servers. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 1623\u20131627. IEEE (2017)","DOI":"10.1109\/IJCNN.2017.7966045"},{"key":"7_CR97","unstructured":"Yin, Y.: Deep learning with the random neural network and its applications. ArXiv abs\/1810.08653 (2018)"},{"key":"7_CR98","unstructured":"Yin, Y., Gelenbe, E.: Deep learning in multi-layer architectures of dense nuclei. arXiv preprint arXiv:1609.07160 (2016)"},{"issue":"9","key":"7_CR99","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TIFS.2019.2895963","volume":"14","author":"M Zhang","year":"2019","unstructured":"Zhang, M., de Carnavalet, X.D.C., Wang, L., Ragab, A.: Large-scale empirical study of important features indicative of discovered vulnerabilities to assess application security. IEEE Trans. Inf. Forensics Secur. 14(9), 2315\u20132330 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR100","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Combining software metrics and text features for vulnerable file prediction. In: 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 40\u201349 (2015)","DOI":"10.1109\/ICECCS.2015.15"}],"container-title":["Lecture Notes in Computer Science","Modelling, Analysis, and Simulation of Computer and Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68110-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T19:03:34Z","timestamp":1674932614000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-68110-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030681098","9783030681104"],"references-count":100,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68110-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MASCOTS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mascots2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mascots.iitis.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}