{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:01:48Z","timestamp":1743019308912,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031492686"},{"type":"electronic","value":"9783031492693"}],"license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-49269-3_15","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T12:03:14Z","timestamp":1701432194000},"page":"139-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Utilization of\u00a0Machine Learning for\u00a0the\u00a0Detection of\u00a0Self-admitted Vulnerabilities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3156-6211","authenticated-orcid":false,"given":"Moritz","family":"Mock","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Aiken, W., Mvula, P.K., Branco, P., Jourdan, G., Sabetzadeh, M., Viktor, H.: Measuring improvement of F1-scores in detection of self-admitted technical debt. In: 2023 ACM\/IEEE International Conference on Technical Debt (TechDebt), pp. 37\u201341. IEEE Computer Society, Los Alamitos, CA, USA, May 2023. https:\/\/doi.org\/10.1109\/TechDebt59074.2023.00011","DOI":"10.1109\/TechDebt59074.2023.00011"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Bavota, G., Russo, B.: A large-scale empirical study on self-admitted technical debt. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, pp. 315\u2013326. Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2901739.2901742","DOI":"10.1145\/2901739.2901742"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Softw. Eng. 48(09), 3280\u20133296 (2022). https:\/\/doi.org\/10.1109\/TSE.2021.3087402","DOI":"10.1109\/TSE.2021.3087402"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/157710.157715","volume":"4","author":"W Cunningham","year":"1992","unstructured":"Cunningham, W.: The WYCash portfolio management system. SIGPLAN OOPS Mess. 4(2), 29\u201330 (1992). https:\/\/doi.org\/10.1145\/157710.157715","journal-title":"SIGPLAN OOPS Mess."},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). https:\/\/doi.org\/10.48550\/arXiv.1810.04805","DOI":"10.48550\/arXiv.1810.04805"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Ebrahimi, A.M., Oliva, G.A., Hassan, A.E.: Self-admitted technical debt in ethereum smart contracts: a large-scale exploratory study. IEEE Trans. Softw. Eng. 49, 4304-4323 (2023). https:\/\/doi.org\/10.1109\/TSE.2023.3289808","DOI":"10.1109\/TSE.2023.3289808"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Fan, J., Li, Y., Wang, S., Nguyen, T.N.: A C\/C++ code vulnerability dataset with code changes and CVE summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories, MSR 2020, pp. 508\u2013512. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3379597.3387501","DOI":"10.1145\/3379597.3387501"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Feng, Z., et al.: CodeBERT: a pre-trained model for programming and natural languages. In: Findings of the Association for Computational Linguistics: EMNLP 2020, pp. 1536\u20131547. Association for Computational Linguistics, Online, November 2020. https:\/\/doi.org\/10.18653\/v1\/2020.findings-emnlp.139","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Fu, M., Tantithamthavorn, C.: LineVul: a transformer-based line-level vulnerability prediction. In: 2022 IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR), pp. 608\u2013620 (2022). https:\/\/doi.org\/10.1145\/3524842.3528452","DOI":"10.1145\/3524842.3528452"},{"issue":"4","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447247","volume":"30","author":"Z Guo","year":"2021","unstructured":"Guo, Z., et al.: How far have we progressed in identifying self-admitted technical debts? A comprehensive empirical study. ACM Trans. Softw. Eng. Methodol. 30(4), 1\u201356 (2021). https:\/\/doi.org\/10.1145\/3447247","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Hin, D., Kan, A., Chen, H., Babar, M.A.: LineVD: statement-level vulnerability detection using graph neural networks. In: Proceedings of the 19th International Conference on Mining Software Repositories, MSR 2022, pp. 596\u2013607. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3524842.3527949","DOI":"10.1145\/3524842.3527949"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/s10664-017-9522-4","volume":"23","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Shihab, E., Xia, X., Lo, D., Li, S.: Identifying self-admitted technical debt in open source projects using text mining. Empir. Softw. Eng. 23, 418\u2013451 (2018). https:\/\/doi.org\/10.1007\/s10664-017-9522-4","journal-title":"Empir. Softw. Eng."},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Li, Y., Wang, S., Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2021, pp. 292\u2013303. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3468264.3468597","DOI":"10.1145\/3468264.3468597"},{"issue":"11","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TSE.2017.2654244","volume":"43","author":"EDS Maldonado","year":"2017","unstructured":"Maldonado, E.D.S., Shihab, E., Tsantalis, N.: Using natural language processing to automatically detect self-admitted technical debt. IEEE Trans. Softw. Eng. 43(11), 1044\u20131062 (2017). https:\/\/doi.org\/10.1109\/TSE.2017.2654244","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Potdar, A., Shihab, E.: An exploratory study on self-admitted technical debt. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp. 91\u2013100 (2014). https:\/\/doi.org\/10.1109\/ICSME.2014.31","DOI":"10.1109\/ICSME.2014.31"},{"issue":"3","key":"15_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3324916","volume":"28","author":"X Ren","year":"2019","unstructured":"Ren, X., Xing, Z., Xia, X., Lo, D., Wang, X., Grundy, J.: Neural network-based detection of self-admitted technical debt: from performance to explainability. ACM Trans. Softw. Eng. Methodol. 28(3), 1\u201345 (2019). https:\/\/doi.org\/10.1145\/3324916","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Russo, B., Camilli, M., Mock, M.: WeakSATD: detecting weak self-admitted technical debt. In: 2022 IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR), pp. 448\u2013453 (2022). https:\/\/doi.org\/10.1145\/3524842.3528469","DOI":"10.1145\/3524842.3528469"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Curran Associates Inc., Red Hook, NY, USA (2019). https:\/\/doi.org\/10.48550\/arXiv.1909.03496","DOI":"10.48550\/arXiv.1909.03496"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"111514","DOI":"10.1016\/j.jss.2022.111514","volume":"195","author":"K Zhu","year":"2023","unstructured":"Zhu, K., Yin, M., Zhu, D., Zhang, X., Gao, C., Jiang, J.: SCGRU: a general approach for identifying multiple classes of self-admitted technical debt with text generation oversampling. J. Syst. Softw. 195, 111514 (2023). https:\/\/doi.org\/10.1016\/j.jss.2022.111514","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49269-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T12:04:51Z","timestamp":1731413091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49269-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"ISBN":["9783031492686","9783031492693"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49269-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"2 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dornbirn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/profes-2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}