{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:18:24Z","timestamp":1743027504266,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031223556"},{"type":"electronic","value":"9783031223563"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-22356-3_17","type":"book-chapter","created":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T01:33:46Z","timestamp":1672536826000},"page":"179-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning Based System for the Control and Evaluation of Programming Vulnerabilities"],"prefix":"10.1007","author":[{"given":"Mar\u00eda","family":"Alonso-Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Rub\u00e9n","family":"Fuente-Alonso","sequence":"additional","affiliation":[]},{"given":"Juan M.","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Dempsey, K., Paul, E., George, M., Takamura, E.: In: Automation Support for Security: Software Vulnerability Management. NIST (2020)","DOI":"10.6028\/nist.ir.8011-4"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Rebecca, L., Russell, Kim, L.: Automated vulnerability detection in source code using deep representation learning. In: IEEE International Conference on Machine Learning and Applications (IEEE ICMLA 2018), Orlando, Florida, USA (2018)","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Bilgin, Z., Ersoy, M.A.: Vulnerability prediction from source code using machine learning. pp. 8. (2020)","DOI":"10.1109\/ACCESS.2020.3016774"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Delaitre, A.M., Stivalet, B.C.: Sate V report: ten years of static analysis tool expositions (2018)","DOI":"10.6028\/NIST.SP.500-326"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Engler, D., Chen, D.Y.: Bugs as deviant behavior: a general approach to inferring errors in systems code. 35(5) (2001)","DOI":"10.1145\/502059.502041"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Kim, S., Woo, S.: (s.f.). VUDDY: a scalable approach for vulnerable code clone discovery (2017)","DOI":"10.1109\/SP.2017.62"},{"key":"17_CR7","unstructured":"Engler, D.A.: Under-constrained symbolic execution: correctness checking for real code (2015)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., ... Zhong, Y. Vuldeepecker: a deep learning-based system for vulnerability detection (2018). arXiv preprint arXiv:1801.01681","DOI":"10.14722\/ndss.2018.23158"},{"key":"17_CR9","unstructured":"M. Sutton, Greene, A.: Fuzzing: brute force vulnerability discovery (2007)"},{"key":"17_CR10","unstructured":"Song, J.N.: Dynamic taint analysis for automatic detection analysis and signature generation of exploits on commodity software (2005)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, L.: Automated software vulnerability detection based on hybrid neural network. Appl. Sci. (2021)","DOI":"10.3390\/app11073201"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, J., Wen, S.: Identifying propagation sources in networks: state-of-the-art and comparative studies. 19(1) (2017)","DOI":"10.1109\/COMST.2016.2615098"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Shin, Y., Ersoy, A.M.: Evaluating complexity code churn and developer activity metrics as indicators of software vulnerabilities. 37(6) (2011)","DOI":"10.1109\/TSE.2010.81"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Rahimi, S., Zargham, M.: Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database. 2(62) (2013)","DOI":"10.1109\/TR.2013.2257052"},{"key":"17_CR15","unstructured":"Alhazmi, O.H., Malaiya, M.Y.: Quantitative vulnerability assessment of systems software. In: Reliability and Maintainability Symposium (2005)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Friedman, J.: Greedy function approximation: a gradient boosting machine. 5(29) (2001)","DOI":"10.1214\/aos\/1013203451"},{"key":"17_CR17","unstructured":"Hastie, T.T.: The elements of statistical learning: data mining, inference and prediction (2009)"},{"key":"17_CR18","unstructured":"Johnson, M.K.: In: Applied predictive modeling. Springer (2013)"},{"issue":"19","key":"17_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5103","volume":"31","author":"X Ban","year":"2019","unstructured":"Ban, X., Liu, S., Chen, C., Chua, C.: A performance evaluation of deep-learnt features for software vulnerability detection. Concurrency and Comput.: Practice and Exper. 31(19), e5103 (2019)","journal-title":"Concurrency and Comput.: Practice and Exper."}],"container-title":["Lecture Notes in Networks and Systems","Ambient Intelligence\u2014Software and Applications\u201413th International Symposium on Ambient Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22356-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T02:46:53Z","timestamp":1672541213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22356-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031223556","9783031223563"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22356-3_17","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isami-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}