{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:10:03Z","timestamp":1776399003877,"version":"3.51.2"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00793-w","type":"journal-article","created":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T05:09:08Z","timestamp":1703221748000},"page":"1347-1358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security bug reports classification using fasttext"],"prefix":"10.1007","volume":"23","author":[{"given":"Sultan S.","family":"Alqahtani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,22]]},"reference":[{"key":"793_CR1","unstructured":"Floris, P., Vogt Harald, H.: How to save on software maintenance costs, omnext white pape, vol. SOURCE 2 V (2010)"},{"key":"793_CR2","unstructured":"Rui, S., Tianpei, X., Laurie, W., Tim, M.: Better security bug report classification via hyperparameter optimization (2019). https:\/\/arxiv.org\/pdf\/1905.06872.pdf"},{"key":"793_CR3","doi-asserted-by":"publisher","unstructured":"Chawla, I., Singh, S.K.: Automatic bug labeling using semantic information from LSI. In: 2014 Seventh International Conference on Contemporary Computing (IC3), pp. 376\u2013381 (2014). https:\/\/doi.org\/10.1109\/IC3.2014.6897203.","DOI":"10.1109\/IC3.2014.6897203"},{"key":"793_CR4","doi-asserted-by":"publisher","unstructured":"Bozorgi, M., Saul, L.K., Savage, S., Voelker, G.M.: Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining\u2014KDD \u201910, p. 105 (2010). https:\/\/doi.org\/10.1145\/1835804.1835821","DOI":"10.1145\/1835804.1835821"},{"issue":"6","key":"793_CR5","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/TSE.2017.2787653","volume":"45","author":"F Peters","year":"2019","unstructured":"Peters, F., Tun, T.T., Yu, Y., Nuseibeh, B.: Text filtering and ranking for security bug report prediction. IEEE Trans. Softw. Eng. 45(6), 615\u2013631 (2019). https:\/\/doi.org\/10.1109\/TSE.2017.2787653","journal-title":"IEEE Trans. Softw. Eng."},{"key":"793_CR6","doi-asserted-by":"publisher","unstructured":"Wijayasekara, D., Manic, M., Wright, J.L., McQueen, M.: Mining bug databases for unidentified software vulnerabilities. In: 2012 5th International Conference on Human System Interactions, pp. 89\u201396 (2012). https:\/\/doi.org\/10.1109\/HSI.2012.22","DOI":"10.1109\/HSI.2012.22"},{"issue":"7","key":"793_CR7","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1109\/TSE.2021.3063727","volume":"48","author":"X Wu","year":"2022","unstructured":"Wu, X., Zheng, W., Xia, X., Lo, D.: Data quality matters: a case study on data label correctness for security bug report prediction. IEEE Trans. Softw. Eng. 48(7), 2541\u20132556 (2022). https:\/\/doi.org\/10.1109\/TSE.2021.3063727","journal-title":"IEEE Trans. Softw. Eng."},{"key":"793_CR8","doi-asserted-by":"publisher","unstructured":"Fu, W., Menzies, T.: Easy over hard: a case study on deep learning. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 49\u201360 (2017). https:\/\/doi.org\/10.1145\/3106237.3106256","DOI":"10.1145\/3106237.3106256"},{"key":"793_CR9","doi-asserted-by":"publisher","unstructured":"Liu, Z., Xia, X., Hassan, A.E., Lo, D., Xing, Z., Wang, X.: Neural-machine-translation-based commit message generation: how far are we? In Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 373\u2013384 (2018). https:\/\/doi.org\/10.1145\/3238147.3238190","DOI":"10.1145\/3238147.3238190"},{"key":"793_CR10","doi-asserted-by":"crossref","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, pp. 427\u2013431 (2017). https:\/\/aclanthology.org\/E17-2068","DOI":"10.18653\/v1\/E17-2068"},{"key":"793_CR11","doi-asserted-by":"publisher","unstructured":"Ohira, M., et al.: A dataset of high impact bugs: manually-classified issue reports. In: 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories, pp. 518\u2013521 (2015). https:\/\/doi.org\/10.1109\/MSR.2015.78","DOI":"10.1109\/MSR.2015.78"},{"key":"793_CR12","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"key":"793_CR13","unstructured":"Abir, R., Moulay, A.A. Malbert: using transformers for cybersecurity and malicious software detection (2021). https:\/\/arxiv.org\/pdf\/2103.03806.pdf"},{"key":"793_CR14","doi-asserted-by":"publisher","unstructured":"Roopak, M., Yun Tian, G., Chambers, J.: Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452\u20130457 (2019). https:\/\/doi.org\/10.1109\/CCWC.2019.8666588","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"793_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106529","volume":"210","author":"J Yin","year":"2020","unstructured":"Yin, J., Tang, M., Cao, J., Wang, H.: Apply transfer learning to cybersecurity: predicting exploitability of vulnerabilities by description. Knowl. Based Syst. 210, 106529 (2020). https:\/\/doi.org\/10.1016\/j.knosys.2020.106529","journal-title":"Knowl. Based Syst."},{"key":"793_CR16","unstructured":"Johnson, R., Zhang, T.: Semi-supervised convolutional neural networks for text categorization via region embedding. In: Advances in Neural Information Processing Systems, vol. 28 (2015). https:\/\/proceedings.neurips.cc\/paper\/2015\/file\/acc3e0404646c57502b480dc052c4fe1-Paper.pdf"},{"key":"793_CR17","doi-asserted-by":"publisher","unstructured":"Liu, J., Chang, W.-C., Wu, Y., Yang, Y.: Deep learning for extreme multi-label text classification. In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 115\u2013124 (2017). https:\/\/doi.org\/10.1145\/3077136.3080834","DOI":"10.1145\/3077136.3080834"},{"key":"793_CR18","unstructured":"Alqahtani, S.S.: fasttext implementation (2023). https:\/\/github.com\/isultane\/fasttext_classifications. Accessed 20 June 2023"},{"issue":"12","key":"793_CR19","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TSE.2018.2836442","volume":"45","author":"Q Song","year":"2019","unstructured":"Song, Q., Guo, Y., Shepperd, M.: A comprehensive investigation of the role of imbalanced learning for software defect prediction. IEEE Trans. Softw. Eng. 45(12), 1253\u20131269 (2019). https:\/\/doi.org\/10.1109\/TSE.2018.2836442","journal-title":"IEEE Trans. Softw. Eng."},{"key":"793_CR20","doi-asserted-by":"publisher","unstructured":"Kallis, R., Di Sorbo, A., Canfora, G., Panichella, S.: Ticket tagger: machine learning driven issue classification. In: 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 406\u2013409 (2019). https:\/\/doi.org\/10.1109\/ICSME.2019.00070","DOI":"10.1109\/ICSME.2019.00070"},{"key":"793_CR21","doi-asserted-by":"publisher","unstructured":"Mileva, Y.M., Dallmeier, V., Burger, M., Zeller, A.: Mining trends of library usage. In: Proceedings of the Joint International and Annual ERCIM Workshops on Principles of Software Evolution (IWPSE) and Software Evolution (Evol) Workshops, pp. 57\u201362 (2009). https:\/\/doi.org\/10.1145\/1595808.1595821","DOI":"10.1145\/1595808.1595821"},{"key":"793_CR22","doi-asserted-by":"publisher","unstructured":"Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: 7th IEEE Working Conference on Mining Software Repositories, pp. 11\u201320 (2010). https:\/\/doi.org\/10.1109\/MSR.2010.5463340","DOI":"10.1109\/MSR.2010.5463340"},{"issue":"10","key":"793_CR23","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato, R., Walden, J., Hovsepyan, A., Joosen, W.: Predicting vulnerable software components via text mining. IEEE Trans. Softw. Eng. 40(10), 993\u20131006 (2014). https:\/\/doi.org\/10.1109\/TSE.2014.2340398","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"793_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3503509","volume":"31","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Xia, X., Lo, D., Bi, T., Grundy, J., Yang, X.: Predictive models in software engineering: challenges and opportunities. ACM Trans. Softw. Eng. Methodol. 31(3), 1\u201372 (2022). https:\/\/doi.org\/10.1145\/3503509","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"793_CR25","unstructured":"Sawadogo, A.D., Guimard, T.F., Bissyand\u00e9, Q., Kader Kabor\u00e9, J., Klein, A., Moha, N.: Early Detection of Security-Relevant Bug Reports using Machine Learning: How Far Are We? eprint arXiv:2112.10123 (2021). https:\/\/ui.adsabs.harvard.edu\/abs\/2021arXiv211210123S\/abstract"},{"key":"793_CR26","doi-asserted-by":"crossref","unstructured":"Berrar, D.: Cross-validation. In: Encyclopedia of Bioinformatics and Computational Biology, pp. 542\u2013545. Elsevier (2019)","DOI":"10.1016\/B978-0-12-809633-8.20349-X"},{"issue":"11","key":"793_CR27","doi-asserted-by":"publisher","first-page":"218","DOI":"10.21037\/atm.2016.03.37","volume":"4","author":"Z Zhang","year":"2016","unstructured":"Zhang, Z.: Introduction to machine learning: k-nearest neighbors. Ann. Transl. Med. 4(11), 218\u2013218 (2016). https:\/\/doi.org\/10.21037\/atm.2016.03.37","journal-title":"Ann. Transl. Med."},{"key":"793_CR28","doi-asserted-by":"publisher","unstructured":"Alipour, A., Hindle, A., Stroulia, E.: A contextual approach towards more accurate duplicate bug report detection. In: 2013 10th Working Conference on Mining Software Repositories (MSR), pp. 183\u2013192 (2013). https:\/\/doi.org\/10.1109\/MSR.2013.6624026","DOI":"10.1109\/MSR.2013.6624026"},{"key":"793_CR29","doi-asserted-by":"publisher","unstructured":"Sharma, M., Bedi, P., Chaturvedi, K.K., Singh, V.B.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), pp. 539\u2013545 (2012). https:\/\/doi.org\/10.1109\/ISDA.2012.6416595","DOI":"10.1109\/ISDA.2012.6416595"},{"key":"793_CR30","doi-asserted-by":"publisher","unstructured":"Peng, H., Bing, L., Yutao, M.: Towards cross-project defect prediction with imbalanced feature sets, p. 10 (2014). https:\/\/doi.org\/10.48550\/arXiv.1411.4228","DOI":"10.48550\/arXiv.1411.4228"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00793-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00793-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00793-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:43:22Z","timestamp":1711525402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00793-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["793"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00793-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"21 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author Sultan S. Alqahtani, declares that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}