{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T04:22:04Z","timestamp":1743654124796,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642310867"},{"type":"electronic","value":"9783642310874"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31087-4_80","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T11:54:10Z","timestamp":1340970850000},"page":"794-807","source":"Crossref","is-referenced-by-count":1,"title":["A Method of Software Defects Mining Based on Static Analysis"],"prefix":"10.1007","author":[{"given":"Xiaochen","family":"Lai","sequence":"first","affiliation":[]},{"given":"Kuanjiu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Likun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lemin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yanshuang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"80_CR1","first-page":"1933","volume":"31","author":"H. Chen","year":"2003","unstructured":"Chen, H., Wang, J., Wei, D.: High Confidence Software Engineering Technologies. Acta Electronica Sinica\u00a031(12), 1933\u20131938 (2003)","journal-title":"Acta Electronica Sinica"},{"key":"80_CR2","unstructured":"Christey, S., Martin, R.A.: Vulnerability Type Distributions in CVE. The MITRE Corporation, 1\u201338 (2007)"},{"issue":"1","key":"80_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/602382.602403","volume":"50","author":"C.A.R. Hoare","year":"2003","unstructured":"Hoare, C.A.R.: The verifying compiler: A grand challenge for computing research. Journal of the ACM\u00a050(1), 63\u201369 (2003)","journal-title":"Journal of the ACM"},{"issue":"9","key":"80_CR4","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.3724\/SP.J.1016.2008.01549","volume":"31","author":"J. Zhang","year":"2008","unstructured":"Zhang, J.: Sharp Static Analysis of Programs. Chinese Journal of Computers\u00a031(9), 1549\u20131553 (2008)","journal-title":"Chinese Journal of Computers"},{"issue":"6","key":"80_CR5","doi-asserted-by":"publisher","first-page":"953","DOI":"10.3724\/SP.J.1016.2011.00953","volume":"34","author":"Z. Cui","year":"2011","unstructured":"Cui, Z., Wang, L., Li, X.: Target-Directed Concolic Testing. Chinese Journal of Computers\u00a034(6), 953\u2013964 (2011)","journal-title":"Chinese Journal of Computers"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Hwang, J.G., Jo, H.J., Kim, B.H., Jeong, R.G.: Development of Automatic Testing Tool for Software Coding Rules for Railway Signalling. In: IEEE T&D Asia (2009)","DOI":"10.1063\/1.3225254"},{"key":"80_CR7","doi-asserted-by":"crossref","unstructured":"Chess, B., McGraw, G.: Static analysis for security. IEEE Security & Privacy\u00a0(6), 67\u201369 (2004)","DOI":"10.1109\/MSP.2004.111"},{"key":"80_CR8","unstructured":"Larochelle, D., Evans, D.: Statically Detecting Likely Buffer Overflow Vulnerabilities. In: Proc.10th Usenix Security Symp. (USENIX 2001), pp. 177\u2013189. Usenix Assoc. (2001)"},{"key":"80_CR9","doi-asserted-by":"crossref","unstructured":"Chen, H., Wagner, D.: MOPS:An Infrastructure for Examining Security Properties of Software. In: Proc. 9th ACM Conf. Computer and Communications Security (CCS 2002), pp. 235\u2013244. ACM Press (2002)","DOI":"10.1145\/586139.586142"},{"key":"80_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, H., Zhou, K.: Research on XML based static software security analysis. In: Proc. 2nd WRI World Congress on Software Engineering (WCSE 2010), pp. 141\u2013144 (2010)","DOI":"10.1109\/WCSE.2010.68"},{"key":"80_CR11","unstructured":"Antoniol, G.: XML-Oriented gcc AST Analysis and Transformations. In: Proceedings of the Third IEEE International Workshop on Source Code Analysis and Manipulation, pp. 869\u2013901 (2005)"},{"issue":"6","key":"80_CR12","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TSE.2009.65","volume":"35","author":"N.A. Kraft","year":"2009","unstructured":"Kraft, N.A., Duffy, E.B., Malloy, B.A.: Grammar Recovery from Parse Trees and Metrics-Guided Grammar Refactoring. IEEE Transactions on Software Engineering\u00a035(6), 780\u2013794 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"80_CR13","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.infsof.2006.10.014","volume":"49","author":"N.A. Kraft","year":"2007","unstructured":"Kraft, N.A., Malloy, B.A., Power, J.F.: An Infrastructure to Support Interoperability in Reverse Engineering. Information and Software Technology\u00a049(3), 292\u2013307 (2007)","journal-title":"Information and Software Technology"}],"container-title":["Lecture Notes in Computer Science","Advanced Research in Applied Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31087-4_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T22:57:19Z","timestamp":1743634639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31087-4_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310867","9783642310874"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31087-4_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}