{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T22:14:38Z","timestamp":1760220878708,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032080639","type":"print"},{"value":"9783032080646","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08064-6_10","type":"book-chapter","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:46:11Z","timestamp":1760219171000},"page":"193-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PuRe Defender: A Game-Theoretic Pull Request Assignment with\u00a0Deep RL"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5998-462X","authenticated-orcid":false,"given":"Javad Mokhtari","family":"Koushyar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2629-6172","authenticated-orcid":false,"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9855","authenticated-orcid":false,"given":"George","family":"Atia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"10_CR1","unstructured":"Node.js package manager. https:\/\/www.npmjs.com\/. Accessed 23 June 2025"},{"key":"10_CR2","unstructured":"The python package index. https:\/\/pypi.org\/. Accessed 23 June 2025"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Azeem, M.I., Peng, Q., Wang, Q.: Pull request prioritization algorithm based on acceptance and response probability. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), pp. 231\u2013242. IEEE (2020)","DOI":"10.1109\/QRS51102.2020.00041"},{"key":"10_CR4","unstructured":"BlackDuck: 2025 Open Source Security and Risk Analysis Report. BlackDuck (2025). https:\/\/www.blackduck.com\/content\/dam\/black-duck\/en-us\/reports\/rep-ossra.pdf. Accessed 23 June 2025"},{"key":"10_CR5","unstructured":"Boucher, N., Anderson, R.: Trojan source: invisible vulnerabilities. In: 32nd USENIX Security Symposium (USENIX Security 2023), pp. 6507\u20136524 (2023)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Chacon, S., Straub, B.: Pro Git. Springer, Cham (2014)","DOI":"10.1007\/978-1-4842-0076-6"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Gousios, G., Pinzger, M., van Deursen, A.: An exploratory study of the pull-based software development model. In: Proceedings of the 36th International Conference on Software Engineering, pp. 345\u2013355 (2014)","DOI":"10.1145\/2568225.2568260"},{"issue":"7825","key":"10_CR8","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","volume":"585","author":"CR Harris","year":"2020","unstructured":"Harris, C.R., et al.: Array programming with numpy. Nature 585(7825), 357\u2013362 (2020)","journal-title":"Nature"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Khatoonabadi, S., Abdellatif, A., Costa, D.E., Shihab, E.: Predicting the first response latency of maintainers and contributors in pull requests. IEEE Trans. Softw. Eng. (2024)","DOI":"10.1109\/TSE.2024.3443741"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Ladisa, P., Plate, H., Martinez, M., Barais, O.: SoK: taxonomy of attacks on open-source software supply chains. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 1509\u20131526. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179304"},{"key":"10_CR11","unstructured":"Lanctot, M., et al.: A unified game-theoretic approach to multiagent reinforcement learning. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"10_CR12","unstructured":"Lawson, A.: 2024 Global Spotlight Insights Report. The Linux Foundation (2024)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"de\u00a0Lima\u00a0J\u00fanior, M.L., Soares, D.M., Plastino, A., Murta, L.: Developers assignment for analyzing pull requests. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp. 1567\u20131572 (2015)","DOI":"10.1145\/2695664.2695884"},{"key":"10_CR14","unstructured":"Mnih, V., et al.: Asynchronous methods for deep reinforcement learning. In: International Conference on Machine Learning, pp. 1928\u20131937. PMLR (2016)"},{"key":"10_CR15","unstructured":"Muller, P., et\u00a0al.: A generalized training approach for multiagent learning. arXiv preprint arXiv:1909.12823 (2019)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-52683-2_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Ohm","year":"2020","unstructured":"Ohm, M., Plate, H., Sykosch, A., Meier, M.: Backstabber\u2019s knife collection: a review of open source software supply chain attacks. In: Maurice, C., Bilge, L., Stringhini, G., Neves, N. (eds.) DIMVA 2020. LNCS, vol. 12223, pp. 23\u201343. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52683-2_2"},{"key":"10_CR17","unstructured":"Page, C.: Apple iCloud, Twitter and Minecraft vulnerable to \u2018ubiquitous\u2019 zero-day flaw. Tech Crunch (2021). https:\/\/techcrunch.com\/2021\/12\/10\/apple-icloud-twitter-and-minecraft-vulnerable-to-ubiquitous-zero-day-exploit\/"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Pearce, J.M.: Economic savings for scientific free and open source technology: a review. HardwareX 8 (2020)","DOI":"10.1016\/j.ohx.2020.e00139"},{"key":"10_CR19","unstructured":"Raywood, D.: Vulnerable instances of log4j still being used nearly 3 years later (2024). https:\/\/www.scworld.com\/news\/vulnerable-instances-of-log4j-still-being-used-nearly-3-years-later"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Rong, G., Zhang, Y., Yang, L., Zhang, F., Kuang, H., Zhang, H.: Modeling review history for reviewer recommendation: a hypergraph approach. In: Proceedings of the 44th International Conference on Software Engineering, pp. 1381\u20131392 (2022)","DOI":"10.1145\/3510003.3510213"},{"key":"10_CR21","unstructured":"Schulman, J., Moritz, P., Levine, S., Jordan, M., Abbeel, P.: High-dimensional continuous control using generalized advantage estimation. arXiv preprint arXiv:1506.02438 (2015)"},{"key":"10_CR22","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347 (2017)"},{"issue":"6","key":"10_CR23","doi-asserted-by":"publisher","first-page":"6510","DOI":"10.1109\/TPWRS.2018.2829021","volume":"33","author":"L Thurner","year":"2018","unstructured":"Thurner, L., et al.: Pandapower\u2013an open-source python tool for convenient modeling, analysis, and optimization of electric power systems. IEEE Trans. Power Syst. 33(6), 6510\u20136521 (2018). https:\/\/doi.org\/10.1109\/TPWRS.2018.2829021","journal-title":"IEEE Trans. Power Syst."},{"key":"10_CR24","unstructured":"Wu, Q., Lu, K.: On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits. Proc. Oakland 17 (2021)"},{"issue":"7","key":"10_CR25","doi-asserted-by":"publisher","first-page":"5619","DOI":"10.1007\/s00500-020-05559-3","volume":"25","author":"X Ye","year":"2021","unstructured":"Ye, X., Zheng, Y., Aljedaani, W., Mkaouer, M.W.: Recommending pull request reviewers based on code changes. Soft. Comput. 25(7), 5619\u20135632 (2021). https:\/\/doi.org\/10.1007\/s00500-020-05559-3","journal-title":"Soft. Comput."},{"key":"10_CR26","unstructured":"Zimmermann, M., Staicu, C.A., Tenny, C., Pradel, M.: Small world with high risks: a study of security threats in the NPM ecosystem. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 995\u20131010 (2019)"}],"container-title":["Lecture Notes in Computer Science","Game Theory and AI for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08064-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:46:26Z","timestamp":1760219186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08064-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"ISBN":["9783032080639","9783032080646"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08064-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"12 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GameSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Game Theory and AI for Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gamesec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.gamesec-conf.org\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}