{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T23:40:13Z","timestamp":1768866013626,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10515-025-00582-w","type":"journal-article","created":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T04:26:58Z","timestamp":1764217618000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Domain-constrained synthesis of inconsistent key aspects in textual vulnerability descriptions"],"prefix":"10.1007","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9747-4426","authenticated-orcid":false,"given":"Linyi","family":"Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2162-0407","authenticated-orcid":false,"given":"Shidong","family":"Pan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7663-1421","authenticated-orcid":false,"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9247-7521","authenticated-orcid":false,"given":"Sofonias","family":"Yitagesu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3931-3886","authenticated-orcid":false,"given":"Xiaowang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8158-7453","authenticated-orcid":false,"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5212-7068","authenticated-orcid":false,"given":"Jiamou","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8877-4267","authenticated-orcid":false,"given":"Qing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"issue":"6","key":"582_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.3390\/E19060275","volume":"19","author":"C Bentz","year":"2017","unstructured":"Bentz, C., Alikaniotis, D., Cysouw, M., Ferrer-i-Cancho, R.: The entropy of words - learnability and expressivity across more than 1000 languages. Entropy 19(6), 275 (2017). https:\/\/doi.org\/10.3390\/E19060275","journal-title":"Entropy"},{"issue":"4","key":"582_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/12944.12948","volume":"11","author":"BW Boehm","year":"1988","unstructured":"Boehm, B.W.: A spiral model of software development and enhancement. ACM SIGSOFT Software Engineering Notes 11(4), 14\u201324 (1988)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"1","key":"582_CR3","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.joi.2010.10.009","volume":"5","author":"L Bornmann","year":"2011","unstructured":"Bornmann, L., Daniel, H.-D.: Manuscript and reviewer characteristics that influence the peer review process: The case of the journals in the \u2018web of science\u2019subject category \u2018information science & library science\u2019. J. Informet. 5(1), 137\u2013158 (2011)","journal-title":"J. Informet."},{"key":"582_CR4","unstructured":"Vulnerability management resource guide. Technical report, Cybersecurity and Infrastructure Security Agency (CISA) (2022).https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CRR_Resource_Guide-VM_0.pdf"},{"issue":"2","key":"582_CR5","first-page":"127","volume":"8","author":"H Chu","year":"2017","unstructured":"Chu, H., Zhang, M.: Security labels for software packages: Improving security understanding and decision-making. J. Inf. Secur. 8(2), 127\u2013138 (2017)","journal-title":"J. Inf. Secur."},{"key":"582_CR6","doi-asserted-by":"publisher","unstructured":"Guo, H., Chen, S., Xing, Z., Li, X., Bai, Y., Sun, J.: Detecting and augmenting missing key aspects in vulnerability descriptions. ACM Trans. Softw. Eng. Methodol. 31(3), 49\u201314927 (2022). https:\/\/doi.org\/10.1145\/3498537","DOI":"10.1145\/3498537"},{"key":"582_CR7","unstructured":"Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y., Wang, G.: Towards the detection of inconsistencies in public security vulnerability reports. In: Heninger, N., Traynor, P. (eds.) 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, pp. 869\u2013885. USENIX Association, Berkeley, CA, USA (2019). https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/dong"},{"key":"582_CR8","doi-asserted-by":"publisher","unstructured":"He, Y., Wang, Y., Zhu, S., Wang, W., Zhang, Y., Li, Q., Yu, A.: Automatically identifying CVE affected versions with patches and developer logs. IEEE Trans. Dependable Secur. Comput. 21(2), 905\u2013919 (2024). https:\/\/doi.org\/10.1109\/TDSC.2023.3264567","DOI":"10.1109\/TDSC.2023.3264567"},{"issue":"5","key":"582_CR9","first-page":"45","volume":"16","author":"M Green","year":"2018","unstructured":"Green, M., Smith, J.: Developer barriers to security tool usage: Understanding and addressing usability challenges. IEEE Security & Privacy 16(5), 45\u201353 (2018)","journal-title":"IEEE Security & Privacy"},{"key":"582_CR10","unstructured":"Guu, K., Lee, K., Tung, Z., Pasupat, P., Chang, M.: REALM: retrieval-augmented language model pre-training (2020). arXiv:2002.08909"},{"key":"582_CR11","unstructured":"Zhou, D., Sch\u00e4rli, N., Hou, L., Wei, J., Scales, N., Wang, X., Schuurmans, D., Cui, C., Bousquet, O., Le, Q.V., Chi, E.H.: Least-to-most prompting enables complex reasoning in large language models. In: The Eleventh International Conference on Learning Representations, ICLR 2023, Kigali, Rwanda, May 1-5, 2023. OpenReview.net, Kigali, Rwanda (2023). https:\/\/openreview.net\/pdf?id=WZH7099tgfM"},{"issue":"3","key":"582_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/3498537","volume":"31","author":"H Guo","year":"2022","unstructured":"Guo, H., Chen, S., Xing, Z., Li, X., Bai, Y., Sun, J.: Detecting and augmenting missing key aspects in vulnerability descriptions. ACM Trans. Softw. Eng. Methodol. 31(3), 49\u201314927 (2022). https:\/\/doi.org\/10.1145\/3498537","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"582_CR13","doi-asserted-by":"publisher","unstructured":"Sun, J., Xing, Z., Xu, X., Zhu, L., Lu, Q.: Heterogeneous vulnerability report traceability recovery by vulnerability aspect matching. In: IEEE International Conference on Software Maintenance and Evolution, ICSME 2022, Limassol, Cyprus, October 3-7, 2022, pp. 175\u2013186. IEEE, Piscataway, NJ, USA (2022). https:\/\/doi.org\/10.1109\/ICSME55016.2022.00024","DOI":"10.1109\/ICSME55016.2022.00024"},{"issue":"1","key":"582_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.20982\/tqmp.08.1.p023","volume":"8","author":"KA Hallgren","year":"2012","unstructured":"Hallgren, K.A.: Computing inter-rater reliability for observational data: An overview and tutorial. Tutorials in Quantitative Methods for Psychology 8(1), 23\u201334 (2012)","journal-title":"Tutorials in Quantitative Methods for Psychology"},{"key":"582_CR15","doi-asserted-by":"publisher","unstructured":"Guo, H., Xing, Z., Chen, S., Li, X., Bai, Y., Zhang, H.: Key aspects augmentation of vulnerability description based on multiple security databases. In: IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021, Madrid, Spain, July 12-16, 2021, pp. 1020\u20131025. IEEE, Piscataway, NJ, USA (2021). https:\/\/doi.org\/10.1109\/COMPSAC51774.2021.00138","DOI":"10.1109\/COMPSAC51774.2021.00138"},{"issue":"3","key":"582_CR16","first-page":"344","volume":"46","author":"L Han","year":"2020","unstructured":"Han, L., Liu, W.: A framework for standardized security labels: Enhancing software security comprehension. IEEE Trans. Software Eng. 46(3), 344\u2013355 (2020)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"582_CR17","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TDSC.2023.3264567","volume":"21","author":"Y He","year":"2024","unstructured":"He, Y., Wang, Y., Zhu, S., Wang, W., Zhang, Y., Li, Q., Yu, A.: Automatically identifying CVE affected versions with patches and developer logs. IEEE Trans. Dependable Secur. Comput. 21(2), 905\u2013919 (2024). https:\/\/doi.org\/10.1109\/TDSC.2023.3264567","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"582_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TSE.2019.2925660","volume":"46","author":"X Huang","year":"2020","unstructured":"Huang, X., Li, X., Zheng, S.: Detecting and resolving inconsistencies in software models: A survey. IEEE Trans. Software Eng. 46(2), 165\u2013180 (2020). https:\/\/doi.org\/10.1109\/TSE.2019.2925660","journal-title":"IEEE Trans. Software Eng."},{"key":"582_CR19","unstructured":"Pressman, R.S.: Software Engineering: A Practitioner\u2019s Approach. McGraw-Hill, New York, USA (2005)"},{"key":"582_CR20","volume":"158","author":"J Kim","year":"2019","unstructured":"Kim, J., Lee, S.: Code analysis tool combining static and dynamic techniques for enhanced vulnerability detection. J. Syst. Softw. 158, 110404 (2019)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"582_CR21","doi-asserted-by":"publisher","first-page":"280","DOI":"10.3390\/E24020280","volume":"24","author":"N Levshina","year":"2022","unstructured":"Levshina, N.: Frequency, informativity and word length: Insights from typologically diverse corpora. Entropy 24(2), 280 (2022). https:\/\/doi.org\/10.3390\/E24020280","journal-title":"Entropy"},{"issue":"6","key":"582_CR22","first-page":"4854","volume":"25","author":"X Li","year":"2020","unstructured":"Li, X., Zhang, Q.: Interactive security tools with real-time feedback for integrated software development. Empir. Softw. Eng. 25(6), 4854\u20134878 (2020)","journal-title":"Empir. Softw. Eng."},{"key":"582_CR23","doi-asserted-by":"crossref","unstructured":"Pushkarna, M., Zaldivar, A., Kjartansson, O.: Data cards: Purposeful and transparent dataset documentation for responsible ai. In: Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency, pp. 1776\u20131826 (2022)","DOI":"10.1145\/3531146.3533231"},{"issue":"1","key":"582_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MSEC.2023.3333936","volume":"22","author":"F Massacci","year":"2024","unstructured":"Massacci, F.: The holy grail of vulnerability predictions. IEEE Secur. Priv. 22(1), 4\u20136 (2024). https:\/\/doi.org\/10.1109\/MSEC.2023.3333936","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"582_CR25","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh, M.L.: Interrater reliability: the kappa statistic. Biochemia Medica 22(3), 276\u2013282 (2012)","journal-title":"Biochemia Medica"},{"key":"582_CR26","unstructured":"Pan, S., Hoang, T., Zhang, D., Xing, Z., Xu, X., Lu, Q., Staples, M.: Toward the cure of privacy policy reading phobia: Automated generation of privacy nutrition labels from privacy policies (2023). arXiv:2306.10923"},{"key":"582_CR27","unstructured":"Si, M., Pan, S., Liao, D., Sun, X., Tao, Z., Shi, W., Xing, Z.: A solution toward transparent and practical ai regulation: Privacy nutrition labels for open-source generative ai-based applications (2024). arXiv:2407.15407"},{"key":"582_CR28","unstructured":"National Institute of Standards and Technology. https:\/\/www.nist.gov\/"},{"key":"582_CR29","doi-asserted-by":"publisher","unstructured":"Han, L., Pan, S., Xing, Z., Sun, J., Yitagesu, S., Zhang, X., Feng, Z.: Don\u2019t chase your tail! missing key aspects augmentation in textual vulnerability descriptions of long-tail software through feature inference (2024).\u00a0https:\/\/doi.org\/10.48550\/arXiv.2405.07430","DOI":"10.48550\/arXiv.2405.07430"},{"key":"582_CR30","doi-asserted-by":"publisher","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Li, X., Han, L.: Unsupervised labeling and extraction of phrase-based concepts in vulnerability descriptions. In: 36th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2021, Melbourne, Australia, November 15-19, 2021, pp. 943\u2013954. IEEE, Piscataway, NJ, USA (2021). https:\/\/doi.org\/10.1109\/ASE51524.2021.9678638","DOI":"10.1109\/ASE51524.2021.9678638"},{"key":"582_CR31","unstructured":"OpenAI: Rule-based rewards for language model safety (2023)"},{"key":"582_CR32","volume-title":"Software Engineering: A Practitioner\u2019s Approach","author":"RS Pressman","year":"2005","unstructured":"Pressman, R.S.: Software Engineering: A Practitioner\u2019s Approach. McGraw-Hill, New York, USA (2005)"},{"key":"582_CR33","doi-asserted-by":"publisher","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948).https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"582_CR34","doi-asserted-by":"publisher","unstructured":"Shu, L., Luo, L., Hoskere, J., Zhu, Y., Liu, Y., Tong, S., Chen, J., Meng, L.: Rewritelm: An instruction-tuned large language model for text rewriting. In: Wooldridge, M.J., Dy, J.G., Natarajan, S. (eds.) Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2024, February 20-27, 2024, Vancouver, Canada, pp. 18970\u201318980. AAAI Press, Palo Alto, California, USA (2024). https:\/\/doi.org\/10.1609\/AAAI.V38I17.29863","DOI":"10.1609\/AAAI.V38I17.29863"},{"issue":"3","key":"582_CR35","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","journal-title":"Bell Syst. Tech. J."},{"key":"582_CR36","unstructured":"Yu, S., Cong, J., Liang, J., Liu, H.: The distribution of information content in english sentences (2016). arXiv:1609.07681"},{"key":"582_CR37","doi-asserted-by":"publisher","unstructured":"Zhai, C., Lafferty, J.D.: A study of smoothing methods for language models applied to ad hoc information retrieval. SIGIR Forum 51(2), 268\u2013276 (2017). https:\/\/doi.org\/10.1145\/3130348.3130377","DOI":"10.1145\/3130348.3130377"},{"issue":"5","key":"582_CR38","first-page":"8","volume":"17","author":"L Simko","year":"2019","unstructured":"Simko, L., Roesner, F., Kohno, T.: Ask the experts: What should be on an iot privacy and security label? IEEE Security & Privacy 17(5), 8\u201316 (2019)","journal-title":"IEEE Security & Privacy"},{"key":"582_CR39","doi-asserted-by":"publisher","unstructured":"Levshina, N.: Frequency, informativity and word length: Insights from typologically diverse corpora. Entropy 24(2), 280 (2022). https:\/\/doi.org\/10.3390\/E24020280","DOI":"10.3390\/E24020280"},{"key":"582_CR40","doi-asserted-by":"crossref","unstructured":"McHugh, M.L.: Interrater reliability: the kappa statistic. Biochemia Medica 22(3), 276\u2013282 (2012)","DOI":"10.11613\/BM.2012.031"},{"key":"582_CR41","doi-asserted-by":"crossref","unstructured":"Bornmann, L., Daniel, H.-D.: Manuscript and reviewer characteristics that influence the peer review process: The case of the journals in the \u2018web of science\u2019subject category \u2018information science & library science.\u2019 J. Informet. 5(1), 137\u2013158 (2011)","DOI":"10.1016\/j.lisr.2009.07.010"},{"key":"582_CR42","doi-asserted-by":"crossref","unstructured":"Hallgren, K.A.: Computing inter-rater reliability for observational data: An overview and tutorial. Tutorials in Quantitative Methods for Psychology 8(1), 23\u201334 (2012)","DOI":"10.20982\/tqmp.08.1.p023"},{"key":"582_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2023.103477","volume":"135","author":"H Sun","year":"2023","unstructured":"Sun, H., Ou, G., Zheng, Z., Liao, L., Wang, H., Zhang, Y.: Inconsistent measurement and incorrect detection of software names in security vulnerability reports. Comput. Secur. 135, 103477 (2023). https:\/\/doi.org\/10.1016\/J.COSE.2023.103477","journal-title":"Comput. Secur."},{"issue":"2","key":"582_CR44","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/3624734","volume":"33","author":"J Sun","year":"2024","unstructured":"Sun, J., Xing, Z., Xia, X., Lu, Q., Xu, X., Zhu, L.: Aspect-level information discrepancies across heterogeneous vulnerability reports: Severity, types and detection methods. ACM Trans. Softw. Eng. Methodol. 33(2), 49\u201314938 (2024). https:\/\/doi.org\/10.1145\/3624734","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"582_CR45","doi-asserted-by":"publisher","unstructured":"Zhang, S., Zhang, J., Song, X., Adeshina, S., Zheng, D., Faloutsos, C., Sun, Y.: Page-link: Path-based graph neural network explanation for heterogeneous link prediction. In: Ding, Y., Tang, J., Sequeda, J.F., Aroyo, L., Castillo, C., Houben, G. (eds.) Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 3784\u20133793. ACM, ??? (2023). https:\/\/doi.org\/10.1145\/3543507.3583511","DOI":"10.1145\/3543507.3583511"},{"key":"582_CR46","unstructured":"Skaggs, J., Richards, M., Morris, M., Goodrich, M.A., Crandall, J.W.: Fostering collective action in complex societies using community-based agents. In: Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI 2024, Jeju, South Korea, August 3-9, 2024, pp. 211\u2013219. ijcai.org, ??? (2024). https:\/\/www.ijcai.org\/proceedings\/2024\/24"},{"issue":"1","key":"582_CR47","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TR.2022.3148729","volume":"71","author":"L Wang","year":"2022","unstructured":"Wang, L., Xu, W.: Hybrid approaches for defect detection: Combining static and dynamic analysis techniques. IEEE Trans. Reliab. 71(1), 105\u2013120 (2022). https:\/\/doi.org\/10.1109\/TR.2022.3148729","journal-title":"IEEE Trans. Reliab."},{"key":"582_CR48","doi-asserted-by":"publisher","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Bi, T., Han, L., Li, X.: Systematic literature review on software security vulnerability information extraction. ACM Trans. Softw. Eng. Methodol. (2025). https:\/\/doi.org\/10.1145\/3745026. Just Accepted","DOI":"10.1145\/3745026"},{"issue":"4","key":"582_CR49","first-page":"1","volume":"27","author":"T Xie","year":"2018","unstructured":"Xie, T., Li, P.: Static analysis tool for vulnerability detection: Improving accuracy with user-friendly interfaces. ACM Transactions on Software Engineering and Methodology 27(4), 1\u201326 (2018)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"582_CR50","doi-asserted-by":"publisher","unstructured":"Guo, S., Wang, Q., Gao, Y., Xie, R., Song, L.: Depth-guided robust and fast point cloud fusion nerf for sparse input views. In: Wooldridge, M.J., Dy, J.G., Natarajan, S. (eds.) Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2024, February 20-27, 2024, Vancouver, Canada, pp. 1976\u20131984. AAAI Press, Palo Alto, California, USA (2024). https:\/\/doi.org\/10.1609\/AAAI.V38I3.27968","DOI":"10.1609\/AAAI.V38I3.27968"},{"issue":"5","key":"582_CR51","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/3579638","volume":"32","author":"S Yitagesu","year":"2023","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Li, X., Han, L.: Extraction of phrase-based concepts in vulnerability descriptions through unsupervised labeling. ACM Trans. Softw. Eng. Methodol. 32(5), 112\u2013111245 (2023). https:\/\/doi.org\/10.1145\/3579638","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"582_CR52","doi-asserted-by":"publisher","unstructured":"Yitagesu, S., Xing, Z., Zhang, X., Feng, Z., Bi, T., Han, L., Li, X.: Systematic literature review on software security vulnerability information extraction. ACM Trans. Softw. Eng. Methodol. (2025). https:\/\/doi.org\/10.1145\/3745026. Just Accepted","DOI":"10.1145\/3745026"},{"key":"582_CR53","unstructured":"Green, M., Smith, J.: Developer barriers to security tool usage: Understanding and addressing usability challenges. IEEE Security & Privacy 16(5), 45\u201353 (2018)"},{"issue":"2","key":"582_CR54","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/3130348.3130377","volume":"51","author":"C Zhai","year":"2017","unstructured":"Zhai, C., Lafferty, J.D.: A study of smoothing methods for language models applied to ad hoc information retrieval. SIGIR Forum 51(2), 268\u2013276 (2017). https:\/\/doi.org\/10.1145\/3130348.3130377","journal-title":"SIGIR Forum"},{"key":"582_CR55","unstructured":"Han, L., Liu, W.: A framework for standardized security labels: Enhancing software security comprehension. IEEE Trans. Software Eng. 46(3), 344\u2013355 (2020)"},{"issue":"6","key":"582_CR56","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/3702987","volume":"34","author":"S Zhang","year":"2025","unstructured":"Zhang, S., Xing, Z., Guo, R., Xu, F., Chen, L., Zhang, Z., Zhang, X., Feng, Z., Zhuang, Z.: Empowering agile-based generative software development through human-ai teamwork. ACM Trans. Softw. Eng. Methodol. 34(6), 156\u2013115646 (2025). https:\/\/doi.org\/10.1145\/3702987","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"582_CR57","unstructured":"Kim, J., Lee, S.: Code analysis tool combining static and dynamic techniques for enhanced vulnerability detection. J. Syst. Softw. 158, 110404 (2019)"},{"issue":"2","key":"582_CR58","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1109\/JAS.2024.124971","volume":"12","author":"X Zhu","year":"2025","unstructured":"Zhu, X., Zhou, W., Han, Q., Ma, W., Wen, S., Xiang, Y.: When software security meets large language models: A survey. IEEE CAA J. Autom. Sinica 12(2), 317\u2013334 (2025). https:\/\/doi.org\/10.1109\/JAS.2024.124971","journal-title":"IEEE CAA J. Autom. Sinica"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00582-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00582-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00582-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:16:00Z","timestamp":1768821360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00582-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["582"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00582-w","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]},"assertion":[{"value":"19 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"35"}}