{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:41:44Z","timestamp":1764175304686,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031184604"},{"type":"electronic","value":"9783031184611"}],"license":[{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T00:00:00Z","timestamp":1665619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-18461-1_10","type":"book-chapter","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T07:15:14Z","timestamp":1665558914000},"page":"145-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["CVD: An Improved Approach of\u00a0Software Vulnerability Detection for\u00a0Object Oriented Programming Languages Using Deep Learning"],"prefix":"10.1007","author":[{"given":"Shaykh","family":"Siddique","sequence":"first","affiliation":[]},{"given":"Al-Amin Islam","family":"Hridoy","sequence":"additional","affiliation":[]},{"given":"Sabrina Alam","family":"Khushbu","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"key":"10_CR1","unstructured":"Common Vulnerabilities Exposures (CVE) (2017). https:\/\/cve.mitre.org. Accessed 18 Oct 2020"},{"key":"10_CR2","unstructured":"Common Weakness Enumeration (CWE) (2017). https:\/\/cve.mitre.org. Accessed 18 Oct 2020"},{"key":"10_CR3","unstructured":"Efficiently Achieve Compliance With C# Testing Tools for.NET Development (2020). https:\/\/www.parasoft.com\/products\/parasoft-dottest. Accessed 18 Oct 2020"},{"key":"10_CR4","unstructured":"Identify all vulnerabilities in your source code (2020). https:\/\/www.parasoft.com\/products\/parasoft-dottest. Accessed 18 Oct 2020"},{"key":"10_CR5","unstructured":"Bengio, Y., LeCun, Y., Henderson, D.: Globally trained handwritten word recognizer using spatial representation, convolutional neural networks, and hidden Markov models. In: Advances in Neural Information Processing Systems, pp. 937\u2013944 (1994)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Black, P.E.: A software assurance reference dataset: thousands of programs with known bugs. J. Res. Nat. Instit. Stand. Technol. 123, 1 (2018)","DOI":"10.6028\/jres.123.005"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT 2010, pp. 177\u2013186. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-7908-2604-3_16","DOI":"10.1007\/978-3-7908-2604-3_16"},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.ijar.2013.01.006","volume":"54","author":"M Bouchard","year":"2013","unstructured":"Bouchard, M., Jousselme, A.-L., Dor\u00e9, P.-E.: A proof for the positive definiteness of the Jaccard index matrix. Int. J. Approximate Reason. 54(5), 615\u2013626 (2013)","journal-title":"Int. J. Approximate Reason."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Butucea, C., Ndaoud, M., Stepanova, N.A., Tsybakov, A.B., et al.: Variable selection with hamming loss. Ann. Stat. 46(5), 1837\u20131875 (2018)","DOI":"10.1214\/17-AOS1572"},{"key":"10_CR10","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet. IEEE Trans. Softw. Eng. 1 (2021)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Chernis, B., Verma, R.: Machine learning methods for software vulnerability detection. In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, pp. 31\u201339 (2018)","DOI":"10.1145\/3180445.3180453"},{"key":"10_CR12","unstructured":"Chung, J., Gulcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014)"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen, J.: A coefficient of agreement for nominal scales. Educ. Psychol. Measur. 20(1), 37\u201346 (1960)","journal-title":"Educ. Psychol. Measur."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Conneau, A., Schwenk, H., Barrault, L., Lecun, Y.: Very deep convolutional networks for natural language processing. arXiv preprint arXiv:1606.01781, 2 (2016)","DOI":"10.18653\/v1\/E17-1104"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"11","key":"10_CR16","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225196","volume":"14","author":"Y Fang","year":"2019","unstructured":"Fang, Y., Han, S., Huang, C., Runpu, W.: TAP: a static analysis model for PHP vulnerabilities based on token and deep learning technology. PLoS ONE 14(11), e0225196 (2019)","journal-title":"PLoS ONE"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228439","volume":"15","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Liu, Y., Huang, C., Liu, L.: FastEmbed: predicting vulnerability exploitation possibility based on ensemble machine learning algorithm. PLoS ONE 15(2), e0228439 (2020)","journal-title":"PLoS ONE"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Friedl, M.A., Brodley, C.E.: Decision tree classification of land cover from remotely sensed data. Remote Sens. Environ. 61(3), 399\u2013409 (1997)","DOI":"10.1016\/S0034-4257(97)00049-7"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Fukunaga, K., Narendra, P.M.: A branch and bound algorithm for computing k-nearest neighbors. IEEE Trans. Comput. C-24(7), 750\u2013753 (1975)","DOI":"10.1109\/T-C.1975.224297"},{"key":"10_CR20","unstructured":"Guaman, D., Sarmiento, P.A., Barba-Guam\u00e1n, L., Cabrera, P., Enciso, L.: Sonarqube as a tool to identify software metrics and technical debt in the source code through static analysis. In: 7th International Workshop on Computer Science and Engineering, WCSE, pp. 171\u2013175 (2017)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278\u2013282. IEEE (1995)","DOI":"10.1109\/ICDAR.1995.598994"},{"issue":"8","key":"10_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Hosmer Jr, D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. John Wiley & Sons (2013)","DOI":"10.1002\/9781118548387"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"28291","DOI":"10.1109\/ACCESS.2019.2900462","volume":"7","author":"G Huang","year":"2019","unstructured":"Huang, G., Li, Y., Wang, Q., Ren, J., Cheng, Y., Zhao, X.: Automatic classification method for software vulnerability based on deep neural network. IEEE Access 7, 28291\u201328298 (2019)","journal-title":"IEEE Access"},{"key":"10_CR25","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Le, T.H.M., Chen, H., Babar, M.A.: Deep learning for source code modeling and generation: models, applications, and challenges. ACM Comput. Surveys (CSUR) 53(3), 1\u201338 (2020)","DOI":"10.1145\/3383458"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"LeCun, Y.: Deep learning & convolutional networks. In: 2015 IEEE Hot Chips 27 Symposium (HCS), pp. 1\u201395. IEEE Computer Society (2015)","DOI":"10.1109\/HOTCHIPS.2015.7477328"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VulDeePecker: a deep learning-based system for vulnerability detection. arXiv preprint arXiv:1801.01681 (2018)","DOI":"10.14722\/ndss.2018.23158"},{"issue":"10","key":"10_CR29","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin, G., Wen, S., Han, Q.-L., Zhang, J., Xiang, Y.: Software vulnerability detection using deep neural networks: a survey. Proc. IEEE 108(10), 1825\u20131848 (2020)","journal-title":"Proc. IEEE"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Loper, E., Bird, S.: NLTK: the natural language toolkit. arXiv preprint cs\/0205028, cs.CL\/0205028 (2002)","DOI":"10.3115\/1118108.1118117"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Manadhata, P.K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2010)","DOI":"10.1109\/TSE.2010.60"},{"issue":"4","key":"10_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3005714","volume":"49","author":"M Pendleton","year":"2016","unstructured":"Pendleton, M., Garcia-Lebron, R., Cho, J.-H., Shouhuai, X.: A survey on systems security metrics. ACM Comput. Surv. (CSUR) 49(4), 1\u201335 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10_CR33","unstructured":"Sharma, V.: An analytical survey of recent worm attacks. Int. J. Comput. Sci. Network Secur. (IJCSNS) 11(11), 99\u2013103 (2011)"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Siddique, S., Ahmed, T., Talukder, M.R.A., Uddin, M.M.: English to Bangla machine translation using recurrent neural network. Int. J. Future Comput. Commun. 9(2) (2020)","DOI":"10.18178\/ijfcc.2020.9.2.564"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Wu, F., Wang, J., Liu, J., Wang, W.: Vulnerability detection with deep learning. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1298\u20131302. IEEE (2017)","DOI":"10.1109\/CompComm.2017.8322752"},{"key":"10_CR36","doi-asserted-by":"publisher","unstructured":"Xinogalos, S.: Studying students\u2019 conceptual grasp of OOP concepts in two interactive programming environments. In: Lytras, M.D., et al. (eds.) WSKS 2008. CCIS, vol. 19, pp. 578\u2013585. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87783-7_73","DOI":"10.1007\/978-3-540-87783-7_73"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Zagane, M., Abdi, M.K., Alenezi, M.: Deep learning for software vulnerabilities detection using code metrics. IEEE Access 8, 74562\u201374570 (2020)","DOI":"10.1109\/ACCESS.2020.2988557"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Future Technologies Conference (FTC) 2022, Volume 1"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18461-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T16:49:34Z","timestamp":1728146974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18461-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,13]]},"ISBN":["9783031184604","9783031184611"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18461-1_10","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,10,13]]},"assertion":[{"value":"13 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTC 2022","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Future Technologies Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/FTC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}