{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:07:53Z","timestamp":1774717673078,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10489-022-03350-5","type":"journal-article","created":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:03:35Z","timestamp":1649095415000},"page":"17614-17635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Machine learning techniques for software vulnerability prediction: a comparative study"],"prefix":"10.1007","volume":"52","author":[{"given":"Gul","family":"Jabeen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0213-1958","authenticated-orcid":false,"given":"Sabit","family":"Rahim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0611-2655","authenticated-orcid":false,"given":"Wasif","family":"Afzal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5864-1888","authenticated-orcid":false,"given":"Dawar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Aftab Ahmed","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Tehmina","family":"Bibi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,4]]},"reference":[{"key":"3350_CR1","doi-asserted-by":"publisher","unstructured":"Kansal Y, Kumar P, Uday K (2018) Coverage \u00e2? based vulnerability discovery modeling to optimize disclosure time using multiattribute approach. June 2017, pp 1\u201312. https:\/\/doi.org\/10.1002\/qre.2380","DOI":"10.1002\/qre.2380"},{"key":"3350_CR2","doi-asserted-by":"crossref","unstructured":"Goseva-Popstojanova K, Tyo J (2018) Identification of security related bug reports via text mining using supervised and unsupervised classification. In: 2018 IEEE International conference on software quality, reliability and security (QRS), IEEE, pp 344\u2013355","DOI":"10.1109\/QRS.2018.00047"},{"key":"3350_CR3","doi-asserted-by":"crossref","unstructured":"\u015eahin C B, Dinler OB, Abualigah L (2021) Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features. Appl Intell, pp 1\u201317","DOI":"10.1007\/s10489-021-02324-3"},{"key":"3350_CR4","doi-asserted-by":"crossref","unstructured":"Zeng J, Nie X, Chen L, Li J, Du G, Shi G (2020) An efficient vulnerability extrapolation using similarity of graph kernel of pdgs. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, pp 1664\u20131671","DOI":"10.1109\/TrustCom50675.2020.00229"},{"key":"3350_CR5","unstructured":"Dam HK, Tran T, Pham TTM, Ng SW, Grundy J, Ghose A (2018) Automatic feature learning for predicting vulnerable software components. IEEE Trans Softw Eng"},{"key":"3350_CR6","unstructured":"Piran A Vulnerability Analysis of Similar Code"},{"key":"3350_CR7","doi-asserted-by":"publisher","unstructured":"Morrison PJ, Pandita R, Xiao X, Chillarege R, Williams L (2018) Are vulnerabilities discovered and resolved like other defects ?. https:\/\/doi.org\/10.1007\/s10664-017-9541-1","DOI":"10.1007\/s10664-017-9541-1"},{"key":"3350_CR8","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Krishna R, Ding Y, Ray B (2021) Deep learning based vulnerability detection: Are we there yet. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2021.3087402"},{"key":"3350_CR9","doi-asserted-by":"crossref","unstructured":"Kalouptsoglou I, Siavvas M, Tsoukalas D, Kehagias D (2020) Cross-project vulnerability prediction based on software metrics and deep learning. In: International Conference on Computational Science and Its Applications, Springer, pp 877\u2013893","DOI":"10.1007\/978-3-030-58811-3_62"},{"key":"3350_CR10","doi-asserted-by":"crossref","unstructured":"Li Z, Zou D, Xu S, Jin H, Zhu Y, Chen Z (2021) Sysevr: A framework for using deep learning to detect software vulnerabilities. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2021.3051525"},{"issue":"2","key":"3350_CR11","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1002\/qre.2754","volume":"37","author":"N Bhatt","year":"2021","unstructured":"Bhatt N, Anand A, Yadavalli Venkata SS (2021) Exploitability prediction of software vulnerabilities. Qual Reliab Eng Int 37(2):648\u2013663","journal-title":"Qual Reliab Eng Int"},{"issue":"19","key":"3350_CR12","doi-asserted-by":"publisher","first-page":"e5103","DOI":"10.1002\/cpe.5103","volume":"31","author":"X Ban","year":"2019","unstructured":"Ban X, Liu S, Chen C, Chua C (2019) A performance evaluation of deep-learnt features for software vulnerability detection. Concurrency and Computation: Practice and Experience 31(19): e5103","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"10","key":"3350_CR13","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/JPROC.2020.2993293","volume":"108","author":"G Lin","year":"2020","unstructured":"Lin G, Wen S, Han Q-L, Zhang J, Xiang Y (2020) Software vulnerability detection using deep neural networks: A survey. Proc IEEE 108(10):1825\u20131848","journal-title":"Proc IEEE"},{"issue":"c","key":"3350_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2019.2954088","volume":"PP","author":"G Lin","year":"2019","unstructured":"Lin G, Zhang J, Member S, Luo W, Pan L, Vel OD, Montague P, Xiang Y, Member S (2019) Software Vulnerability Discovery via Learning Multi-domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. PP(c):1. https:\/\/doi.org\/10.1109\/TDSC.2019.2954088","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"3350_CR15","doi-asserted-by":"publisher","unstructured":"Alhazmi OH, Malaiya YK (2005) Quantitative Vulnerability Assessment of Systems Software. Reliability and Maintainability Symposium, 2005. Proceedings. Annual, pp 615\u2013620. https:\/\/doi.org\/10.1109\/RAMS.2005.1408432, https:\/\/www.dropbox.com\/s\/pjc8a97q5vjomgp\/Quantitativevulnerabilityassessmentofsystemssoftware.pdf?dl=0","DOI":"10.1109\/RAMS.2005.1408432"},{"issue":"2","key":"3350_CR16","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TR.2013.2257052","volume":"62","author":"S Rahimi","year":"2013","unstructured":"Rahimi S, Zargham M (2013) Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database . IEEE Trans Reliab 62(2):395\u2013407. https:\/\/doi.org\/10.1109\/TR.2013.2257052","journal-title":"IEEE Trans Reliab"},{"issue":"6","key":"3350_CR17","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s10207-016-0345-x","volume":"16","author":"HC Joh","year":"2017","unstructured":"Joh HC, Malaiya YK (2017) Periodicity in software vulnerability discovery, patching and exploitation. Int J Inf Secur 16(6):673\u2013690. https:\/\/doi.org\/10.1007\/s10207-016-0345-x","journal-title":"Int J Inf Secur"},{"key":"3350_CR18","doi-asserted-by":"publisher","first-page":"44276","DOI":"10.1109\/ACCESS.2019.2907977","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Ma RUI, Li B, Tian D, Wang X (2019) E-WBM : An Effort-Based Vulnerability Discovery Model. IEEE Access 7:44276\u201344292. https:\/\/doi.org\/10.1109\/ACCESS.2019.2907977","journal-title":"IEEE Access"},{"key":"3350_CR19","doi-asserted-by":"crossref","unstructured":"Anand A, Bhatt N, Alhazmi OH (2021) Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters. pp 709\u2013722","DOI":"10.1007\/s10796-020-10004-9"},{"key":"3350_CR20","doi-asserted-by":"publisher","unstructured":"Liu B, Shi L, Cai Z, Li M (2012) Software vulnerability discovery techniques: A survey. Proc. - 2012 4th Int. Conf. Multimed. Secur. MINES 2012, pp 152\u2013156. https:\/\/doi.org\/10.1109\/MINES.2012.202","DOI":"10.1109\/MINES.2012.202"},{"key":"3350_CR21","doi-asserted-by":"publisher","unstructured":"Joh H, Malaiya YK (2014) Modeling Skewness in Vulnerability Discovery. Qual Reliab Eng Int, September 2013. https:\/\/doi.org\/10.1002\/qre.1567","DOI":"10.1002\/qre.1567"},{"key":"3350_CR22","doi-asserted-by":"publisher","first-page":"101596","DOI":"10.1016\/j.cose.2019.101596","volume":"87","author":"Y Movahedi","year":"2019","unstructured":"Movahedi Y, Cukier M, Gashi I (2019) Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. Computers & Security 87:101596","journal-title":"Computers & Security"},{"key":"3350_CR23","doi-asserted-by":"publisher","unstructured":"Anand A, Bhatt N, Aggrawal D (2020) Modeling Software Patch Management Based on Vulnerabilities Discovered. 27(2), pp 1\u201315. https:\/\/doi.org\/10.1142\/S0218539320400033","DOI":"10.1142\/S0218539320400033"},{"key":"3350_CR24","doi-asserted-by":"publisher","unstructured":"Ban X (2018) A performance evaluation of deep-learnt features for software vulnerability detection. November, 1\u201310. https:\/\/doi.org\/10.1002\/cpe.5103","DOI":"10.1002\/cpe.5103"},{"key":"3350_CR25","doi-asserted-by":"crossref","unstructured":"Li Z, Zou D, Xu S, Ou X, Jin H, Wang S, Deng Z, Zhong Y (2018) Vuldeepecker: A deep learning-based system for vulnerability detection. Network and Distributed System Security Symposium","DOI":"10.14722\/ndss.2018.23158"},{"key":"3350_CR26","doi-asserted-by":"crossref","unstructured":"Gupta R, Pal S, Kanade A, Shevade S (2017) Deepfix: Fixing common c language errors by deep learning. In: Thirty-First AAAI Conference on Artificial Intelligence","DOI":"10.1609\/aaai.v31i1.10742"},{"issue":"6","key":"3350_CR27","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TDSC.2014.2373377","volume":"12","author":"LK Shar","year":"2015","unstructured":"Shar LK, Briand LC, Tan HK, Member S (2015) Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning. IEEE Transactions on Dependable and Secure Computing 12(6):688\u2013707. https:\/\/doi.org\/10.1109\/TDSC.2014.2373377","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"3350_CR28","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TDSC.2014.2373377","volume":"12","author":"LK Shar","year":"2015","unstructured":"Shar LK, Briand LC, Tan HBK (2015) Web application vulnerability prediction using hybrid program analysis and machine learning. IEEE Transactions on Dependable and Secure Computing 12(6):688\u2013707","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3350_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jisa.2018.05.005","volume":"41","author":"TK George","year":"2018","unstructured":"George TK, Jacob KP, James RK (2018) Token based detection and neural network based reconstruction framework against code injection vulnerabilities. Journal of Information Security and Applications 41:75\u201391","journal-title":"Journal of Information Security and Applications"},{"key":"3350_CR30","doi-asserted-by":"crossref","unstructured":"Akram J, Liang Q, Luo P (2019) Vcipr : Vulnerable code is identifiable when a patch is released (hacker\u2019s perspective). In: 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), IEEE, pp 402\u2013413","DOI":"10.1109\/ICST.2019.00049"},{"key":"3350_CR31","doi-asserted-by":"publisher","unstructured":"Akram J, Mumtaz M, Gul J, Luo P (2019) Droidmd: An efficient and scalable android malware detection approach at source code level. Int J Inf Comput Secur, 11(1). https:\/\/doi.org\/10.1504\/IJICS.2019.10020453","DOI":"10.1504\/IJICS.2019.10020453"},{"issue":"2","key":"3350_CR32","first-page":"294","volume":"51","author":"J Akram","year":"2021","unstructured":"Akram J, Luo P (2021) Sqvdt: A scalable quantitative vulnerability detection technique for source code security assessment. Software: Practice and Experience 51(2):294\u2013318","journal-title":"Software: Practice and Experience"},{"issue":"5","key":"3350_CR33","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.3390\/app10051692","volume":"10","author":"X Li","year":"2020","unstructured":"Li X, Wang L, Xin Y, Yang Y, Chen Y (2020) Automated vulnerability detection in source code using minimum intermediate representation learning. Appl Sci 10(5):1692","journal-title":"Appl Sci"},{"key":"3350_CR34","doi-asserted-by":"crossref","unstructured":"Saccente N, Dehlinger J, Deng L, Chakraborty S, Xiong Y (2019) Project achilles: A prototype tool for static method-level vulnerability detection of java source code using a recurrent neural network. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering Workshop (ASEW), IEEE, pp 114\u2013121","DOI":"10.1109\/ASEW.2019.00040"},{"key":"3350_CR35","doi-asserted-by":"crossref","unstructured":"Partenza G, Amburgey T, Deng L, Dehlinger J, Chakraborty S (2021) Automatic identification of vulnerable code: Investigations with an ast-based neural network. In: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), IEEE, pp 1475\u20131482","DOI":"10.1109\/COMPSAC51774.2021.00219"},{"key":"3350_CR36","doi-asserted-by":"crossref","unstructured":"Hanif H, Nasir MHNM, Ab Razak MF, Firdaus A, Anuar NB (2021) The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches. J Netw Comput Appl, p 103009","DOI":"10.1016\/j.jnca.2021.103009"},{"issue":"6","key":"3350_CR37","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1049\/iet-sen.2020.0084","volume":"14","author":"AOA Semasaba","year":"2020","unstructured":"Semasaba AOA, Zheng W, Wu X, Agyemang SA (2020) Literature survey of deep learning-based vulnerability analysis on source code. IET Softw 14(6):654\u2013664","journal-title":"IET Softw"},{"key":"3350_CR38","doi-asserted-by":"publisher","first-page":"110659","DOI":"10.1016\/j.jss.2020.110659","volume":"168","author":"W Zheng","year":"2020","unstructured":"Zheng W, Gao J, Wu X, Liu F, Xun Y, Liu G, Chen X (2020) The impact factors on the performance of machine learning-based vulnerability detection: A comparative study. J Syst Softw 168:110659","journal-title":"J Syst Softw"},{"issue":"3","key":"3350_CR39","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/s11859-016-1162-9","volume":"21","author":"J Geng","year":"2016","unstructured":"Geng J, Luo P (2016) A novel vulnerability prediction model to predict vulnerability loss based on probit regression. Wuhan University Journal of Natural Sciences 21(3):214\u2013220","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"3350_CR40","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.cose.2015.03.003","volume":"51","author":"Y Roumani","year":"2015","unstructured":"Roumani Y, Nwankpa JK, Roumani YF (2015) Time series modeling of vulnerabilities. Computers & Security 51:32\u201340","journal-title":"Computers & Security"},{"key":"3350_CR41","doi-asserted-by":"crossref","unstructured":"Rescorla E (2005) Is finding security holes a good idea?. 3(1)","DOI":"10.1109\/MSP.2005.17"},{"issue":"3","key":"3350_CR42","first-page":"47","volume":"57","author":"G Jabeen","year":"2020","unstructured":"Jabeen G, Rahim S, Sahar G, Shah AA, Bibi T (2020) An optimization of vulnerability discovery models using multiple errors iterative analysis method: An optimization of vulnerability discovery models. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 57(3):47\u201360","journal-title":"Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences"},{"issue":"3","key":"3350_CR43","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1007\/s10489-017-0925-0","volume":"47","author":"X Zhu","year":"2017","unstructured":"Zhu X, Cao C, Zhang J (2017) Vulnerability severity prediction and risk metric modeling for software. Appl Intell 47(3):828\u2013836","journal-title":"Appl Intell"},{"key":"3350_CR44","doi-asserted-by":"crossref","unstructured":"Anand A, Das S, Aggrawal D, Klochkov Y (2017) Vulnerability discovery modelling for software with multi-versions. In: Advances in reliability and system engineering. Springer, pp 255\u2013265","DOI":"10.1007\/978-3-319-48875-2_11"},{"key":"3350_CR45","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ress.2018.11.030","volume":"183","author":"R Johnston","year":"2019","unstructured":"Johnston R, Sarkani S, Mazzuchi T, Holzer T, Eveleigh T (2019) Bayesian-model averaging using mcmcbayes for web-browser vulnerability discovery. Reliability Engineering & System Safety 183:341\u2013359","journal-title":"Reliability Engineering & System Safety"},{"key":"3350_CR46","unstructured":"Johnston RA (2018) A multivariate bayesian approach to modeling vulnerability discovery in the software security lifecycle. Ph.D. Thesis, The George Washington University"},{"key":"3350_CR47","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.ress.2018.03.024","volume":"176","author":"R Johnston","year":"2018","unstructured":"Johnston R, Sarkani S, Mazzuchi T, Holzer T, Eveleigh T (2018) Multivariate models using mcmcbayes for web-browser vulnerability discovery. Reliability Engineering & System Safety 176:52\u201361","journal-title":"Reliability Engineering & System Safety"},{"key":"3350_CR48","doi-asserted-by":"crossref","unstructured":"Shrivastava AK, Kapur PK, Anjum M (2019) Vulnerability discovery and patch modeling: State of the art. Reliab Eng, pp 401\u2013419","DOI":"10.1201\/9780429488009-15"},{"key":"3350_CR49","unstructured":"Movahedi Y (2019) Some guidelines for risk assessment of vulnerability discovery processes. Ph.D. Thesis, University of Maryland, College Park"},{"issue":"2","key":"3350_CR50","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s00607-018-0663-0","volume":"101","author":"Y Movahedi","year":"2019","unstructured":"Movahedi Y, Cukier M, Andongabo A, Gashi I (2019) Cluster-based vulnerability assessment of operating systems and web browsers. Computing 101(2):139\u2013160","journal-title":"Computing"},{"issue":"10","key":"3350_CR51","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato R, Walden J, Hovsepyan A, Joosen W (2014) Predicting vulnerable software components via text mining. IEEE Trans Softw Eng 40(10):993\u20131006. https:\/\/doi.org\/10.1109\/TSE.2014.2340398","journal-title":"IEEE Trans Softw Eng"},{"key":"3350_CR52","doi-asserted-by":"crossref","unstructured":"Jabeen G, Ping L, Akram J, Shah AA (2019) An integrated software vulnerability discovery model based on artificial neural network.. In: SEKE, pp 349\u2013458","DOI":"10.18293\/SEKE2019-168"},{"key":"3350_CR53","doi-asserted-by":"crossref","unstructured":"Catal C, Akbulut A, Ekenoglu E, Alemdaroglu M (2017) Development of a software vulnerability prediction web service based on artificial neural networks. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer , pp 59\u201367","DOI":"10.1007\/978-3-319-67274-8_6"},{"issue":"3","key":"3350_CR54","first-page":"e2303","volume":"33","author":"KZ Sultana","year":"2021","unstructured":"Sultana KZ, Anu V, Chong T-Y (2021) Using software metrics for predicting vulnerable classes and methods in java projects: A machine learning approach. Journal of Software: Evolution and Process 33(3):e2303","journal-title":"Journal of Software: Evolution and Process"},{"issue":"9","key":"3350_CR55","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1016\/j.jss.2009.08.023","volume":"83","author":"SH Houmb","year":"2010","unstructured":"Houmb SH, Franqueira VNL, Engum EA (2010) Quantifying security risk level from CVSS estimates of frequency and impact. J Syst Softw 83(9):1622\u20131634. https:\/\/doi.org\/10.1016\/j.jss.2009.08.023","journal-title":"J Syst Softw"},{"issue":"3","key":"3350_CR56","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2006.10.002","volume":"26","author":"OH Alhazmi","year":"2007","unstructured":"Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Computers and Security 26(3):219\u2013228. https:\/\/doi.org\/10.1016\/j.cose.2006.10.002","journal-title":"Computers and Security"},{"key":"3350_CR57","unstructured":"Machine learning group. http:\/\/www.cs.waikato.ac.nz"},{"issue":"1","key":"3350_CR58","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0164-1212(00)00086-8","volume":"56","author":"K El Emam","year":"2001","unstructured":"El Emam K, Melo WL, Machado JC (2001) The prediction of faulty classes using object-oriented design metrics. J. Syst. Softw. 56(1):63\u201375. https:\/\/doi.org\/10.1016\/S0164-1212(00)00086-8","journal-title":"J. Syst. Softw."},{"issue":"3","key":"3350_CR59","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.sysarc.2010.06.003","volume":"57","author":"I Chowdhury","year":"2011","unstructured":"Chowdhury I, Zulkernine M (2011) Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. J Syst Archit 57(3):294\u2013313. https:\/\/doi.org\/10.1016\/j.sysarc.2010.06.003","journal-title":"J Syst Archit"},{"key":"3350_CR60","doi-asserted-by":"crossref","unstructured":"Liu MY (2006) Empirical Relation between Coupling and Attackability in Software Systems : A Case Study on DOS. In: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Ottawa, Canada, pp 57\u2013 64","DOI":"10.1145\/1134744.1134756"},{"key":"3350_CR61","unstructured":"Demuth H (2009) Neural Network Toolbox. The MathWorks Inc., Natr"},{"key":"3350_CR62","doi-asserted-by":"crossref","unstructured":"Jang J-R (1993) ANFIS : Adaptive-Ne twork-Based Fuzzy Inference System. IEEE Trans. Syst. Man. Cybern., 23(3)","DOI":"10.1109\/21.256541"},{"issue":"1-2","key":"3350_CR63","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.aci.2014.04.002","volume":"10","author":"K Tyagi","year":"2014","unstructured":"Tyagi K (2014) An adaptive neuro fuzzy model for estimating the reliability of component-based software systems. Applied Computing and Informatics 10(1-2):38\u201351. https:\/\/doi.org\/10.1016\/j.aci.2014.04.002","journal-title":"Applied Computing and Informatics"},{"key":"3350_CR64","doi-asserted-by":"crossref","unstructured":"Lo J- (2010) Early Software Reliability Prediction Based on Support Vector Machines with Genetic Algorithms. In: 5th IEEE Conference on Industrial Electronics and Applications, pp 2221\u20132226","DOI":"10.1109\/ICIEA.2010.5515129"},{"issue":"2","key":"3350_CR65","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140. https:\/\/doi.org\/10.1007\/BF00058655","journal-title":"Mach Learn"},{"key":"3350_CR66","unstructured":"Quinlan JR (1992) LEARNING WITH CONTINUOUS CLASSES 2 . Constructing Model Trees. In: Preoceedings AL\u201992, vol 92, pp 343\u2013348"},{"key":"3350_CR67","doi-asserted-by":"crossref","unstructured":"Duggal H, Singh P (2012) Comparative study of the performance of m5-rules algorithm with different algorithms","DOI":"10.4236\/jsea.2012.54032"},{"key":"3350_CR68","doi-asserted-by":"crossref","unstructured":"Alsultanny Y (2020) Machine learning by data mining reptree and m5p for predicating novel information for pm10","DOI":"10.37256\/ccds.112020418"},{"key":"3350_CR69","unstructured":"Galathiya A, Ganatra A, Bhensdadia C (2012) Improved Decision Tree Induction Algorithm with Feature Selection, Cross Validation, Model Complexity and Reduced Error Pruning, vol 3. http:\/\/ijcsit.com\/docs\/Volume3\/Vol3Issue2\/ijcsit2012030227.pdf"},{"issue":"1","key":"3350_CR70","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1002\/qre.441","volume":"18","author":"SM Emran","year":"2002","unstructured":"Emran SM, Ye N (2002) Robustness of chi-square and canberra distance metrics for computer intrusion detection. Qual Reliab Eng Int 18(1):19\u201328","journal-title":"Qual Reliab Eng Int"},{"issue":"6","key":"3350_CR71","doi-asserted-by":"publisher","first-page":"3615","DOI":"10.1007\/s10489-020-01935-6","volume":"51","author":"SS Rathore","year":"2021","unstructured":"Rathore SS, Kumar S (2021) An empirical study of ensemble techniques for software fault prediction. Appl Intell 51(6):3615\u20133644","journal-title":"Appl Intell"},{"key":"3350_CR72","first-page":"56","volume":"23","author":"R Fonticella","year":"1998","unstructured":"Fonticella R (1998) The Usefulness of the R2 Statistic. Society 23:56\u201360","journal-title":"Society"},{"key":"3350_CR73","doi-asserted-by":"publisher","first-page":"101610","DOI":"10.1016\/j.cose.2019.101610","volume":"88","author":"E Yasasin","year":"2020","unstructured":"Yasasin E, Prester J, Wagner G, Schryen G (2020) Forecasting it security vulnerabilities\u2013an empirical analysis. Computers & Security 88:101610","journal-title":"Computers & Security"},{"issue":"7","key":"3350_CR74","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.1016\/j.jss.2013.03.045","volume":"86","author":"A Amin","year":"2013","unstructured":"Amin A, Grunske L, Colman A (2013) An approach to software reliability prediction based on time series modeling. J Syst Softw 86(7):1923\u20131932. https:\/\/doi.org\/10.1016\/j.jss.2013.03.045","journal-title":"J Syst Softw"},{"issue":"02","key":"3350_CR75","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1142\/S0218194012400037","volume":"22","author":"W Afzal","year":"2012","unstructured":"Afzal W, Torkar R, Feldt R (2012) Resampling methods in software quality classification. Int J Softw Eng Knowl Eng 22(02):203\u2013223","journal-title":"Int J Softw Eng Knowl Eng"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03350-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03350-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03350-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T10:30:44Z","timestamp":1668853844000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03350-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,4]]},"references-count":75,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["3350"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03350-5","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,4]]},"assertion":[{"value":"7 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}