{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T04:29:15Z","timestamp":1727324955839},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10878-024-01185-z","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T07:32:48Z","timestamp":1724311968000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system"],"prefix":"10.1007","volume":"48","author":[{"given":"Lijin","family":"Shaji","sequence":"first","affiliation":[]},{"given":"R. Suji","family":"Pramila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"key":"1185_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal A, Chandra S, Khan RA (2009) An efficient measurement of object oriented design vulnerability. In: 2009 International conference on availability, reliability and security, pp 618\u2013623. IEEE.","DOI":"10.1109\/ARES.2009.130"},{"key":"1185_CR2","doi-asserted-by":"publisher","first-page":"120562","DOI":"10.1016\/j.eswa.2023.120562","volume":"232","author":"W Ali","year":"2023","unstructured":"Ali W, Bo L, Sun X, Wu X, Memon S, Siraj S, Ashton AS (2023) Automated software bug localization enabled by meta-heuristic-based convolutional neural network and improved deep neural network. Expert Syst Appl 232:120562","journal-title":"Expert Syst Appl"},{"key":"1185_CR3","doi-asserted-by":"crossref","unstructured":"Antunes N, Vieira M (2010) Benchmarking vulnerability detection tools for web services. In: 2010 IEEE international conference on web services, pp 203\u2013210. IEEE.","DOI":"10.1109\/ICWS.2010.76"},{"key":"1185_CR4","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s10994-013-5380-5","volume":"94","author":"O Arandjelovi\u0107","year":"2014","unstructured":"Arandjelovi\u0107 O (2014) Discriminative extended canonical correlation analysis for pattern set matching. Mach Learn 94:353\u2013370","journal-title":"Mach Learn"},{"issue":"2","key":"1185_CR5","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1002\/qre.2754","volume":"37","author":"N Bhatt","year":"2021","unstructured":"Bhatt N, Anand A, Yadavalli VSS (2021) Exploitability prediction of software vulnerabilities. Qual Reliab Eng Int 37(2):648\u2013663","journal-title":"Qual Reliab Eng Int"},{"issue":"2","key":"1185_CR6","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1108\/JEIM-05-2017-0069","volume":"31","author":"B Biswas","year":"2018","unstructured":"Biswas B, Mukhopadhyay A (2018) G-RAM framework for software risk assessment and mitigation strategies in organizations. J Enterp Inf Manage 31(2):276\u2013299","journal-title":"J Enterp Inf Manage"},{"issue":"4","key":"1185_CR7","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1109\/TSG.2018.2844307","volume":"10","author":"K Chen","year":"2019","unstructured":"Chen K, Chen K, Wang Q, He Z, Hu J, He J (2019) Short-term load forecasting with deep residual networks. IEEE Trans Smart Grid 10(4):3943\u20133952","journal-title":"IEEE Trans Smart Grid"},{"key":"1185_CR8","doi-asserted-by":"crossref","unstructured":"Dai H, Murphy C, Kaiser G (2010) Configuration fuzzing for software vulnerability detection. In: 2010 International Conference on availability, reliability and security, pp 525\u2013530. IEEE.","DOI":"10.1109\/ARES.2010.22"},{"issue":"3","key":"1185_CR9","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TSE.2020.3004525","volume":"48","author":"LNQ Do","year":"2020","unstructured":"Do LNQ, Wright JR, Ali K (2020) Why do software developers use static analysis tools? a user-centered study of developer needs and motivations. IEEE Trans Software Eng 48(3):835\u2013847","journal-title":"IEEE Trans Software Eng"},{"issue":"7","key":"1185_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.12700\/APH.17.7.2020.7.11","volume":"17","author":"L Erdodi","year":"2020","unstructured":"Erdodi L, Josang A (2020) Exploitation vs, prevention: the ongoing saga of software vulnerabilities. Acta Polytech Hung 17(7):199","journal-title":"Acta Polytech Hung"},{"key":"1185_CR11","unstructured":"Finifter M, Akhawe D, Wagner DA (2013) An empirical study of vulnerability rewards programs. In: 2nd USENIX Security Symposium (USENIX Security 13), pp 273\u2013288."},{"key":"1185_CR12","doi-asserted-by":"publisher","first-page":"8457","DOI":"10.1007\/s12652-020-02580-0","volume":"12","author":"D Gaurav","year":"2021","unstructured":"Gaurav D, Garg M, Nagar A, Kumar V, Dehghani M (2021) A novel algorithm for global optimization: rat swarm optimizer. J Ambient Intell Hum Comput 12:8457\u20138482","journal-title":"J Ambient Intell Hum Comput"},{"issue":"4","key":"1185_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3092566","volume":"50","author":"SM Ghaffarian","year":"2017","unstructured":"Ghaffarian SM, Shahriari HR (2017) Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput Surv (CSUR) 50(4):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1185_CR14","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.infsof.2014.07.010","volume":"58","author":"I Hydara","year":"2015","unstructured":"Hydara I, Md Sultan AB, Zulzalil H, Admodisastro N (2015) Current state of research on cross-site scripting (XSS)\u2013a systematic literature review. Inf Software Technol 58:170\u2013186","journal-title":"Inf Software Technol"},{"key":"1185_CR15","unstructured":"Ilya L, Hutter F (2019) Decoupled weight decay regularization. Published as a conference paper at ICLR."},{"issue":"9","key":"1185_CR16","first-page":"e2164","volume":"31","author":"A Kaya","year":"2019","unstructured":"Kaya A, Keceli AS, Catal C, Tekinerdogan B (2019) The impact of feature types, classifiers, and data balancing techniques on software vulnerability prediction models. J Softw: Evol Process 31(9):e2164","journal-title":"J Softw: Evol Process"},{"key":"1185_CR17","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1007\/s12046-017-0696-7","volume":"42","author":"M Kumar","year":"2017","unstructured":"Kumar M, Sharma A (2017) An integrated framework for software vulnerability detection, analysis and mitigation: an autonomic system. S\u0101dhan\u0101 42:1481\u20131493","journal-title":"S\u0101dhan\u0101"},{"key":"1185_CR18","doi-asserted-by":"publisher","unstructured":"Le THM (2022) Towards an improved understanding of software vulnerability assessment using data-driven approaches. https:\/\/doi.org\/10.48550\/arXiv.2207.11708","DOI":"10.48550\/arXiv.2207.11708"},{"issue":"8","key":"1185_CR19","doi-asserted-by":"publisher","first-page":"e0221530","DOI":"10.1371\/journal.pone.0221530","volume":"14","author":"Y Li","year":"2019","unstructured":"Li Y, Ma L, Shen L, Lv J, Zhang P (2019) Open source software security vulnerability detection based on dynamic behavior features. PLoS ONE 14(8):e0221530","journal-title":"PLoS ONE"},{"key":"1185_CR20","doi-asserted-by":"crossref","unstructured":"Li Z, Zou D, Xu S, Jin H, Qi H, Hu J (2016) Vulpecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings 32nd annual conference computer security applications, pp 201\u2013213.","DOI":"10.1145\/2991079.2991102"},{"issue":"7","key":"1185_CR21","doi-asserted-by":"publisher","first-page":"3289","DOI":"10.1109\/TII.2018.2821768","volume":"14","author":"G Lin","year":"2018","unstructured":"Lin G, Zhang J, Luo W, Pan L, Xiang Y, De Vel O, Montague P (2018a) Cross-project transfer representation learning for vulnerable function discovery. IEEE Trans Ind Inf 14(7):3289\u20133297","journal-title":"IEEE Trans Ind Inf"},{"key":"1185_CR22","doi-asserted-by":"publisher","first-page":"111283","DOI":"10.1016\/j.jss.2022.111283","volume":"188","author":"F Lomio","year":"2022","unstructured":"Lomio F, Iannone E, De Lucia A, Palomba F, Lenarduzzi V (2022) Just-in-time software vulnerability detection: are we there yet? J Syst Software 188:111283","journal-title":"J Syst Software"},{"key":"1185_CR23","doi-asserted-by":"publisher","first-page":"107350","DOI":"10.1016\/j.infsof.2023.107350","volume":"166","author":"JP Meher","year":"2024","unstructured":"Meher JP, Biswas S, Mall R (2024) Deep learning-based software bug classification. Inf Software Technol 166:107350","journal-title":"Inf Software Technol"},{"issue":"1","key":"1185_CR24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/23742917.2020.1816647","volume":"5","author":"NR Pokhrel","year":"2021","unstructured":"Pokhrel NR, Khanal N, Tsokos CP, Pokhrel K (2021) Cybersecurity: a predictive analytical model for software vulnerability discovery process. J Cyber Secur Technol 5(1):41\u201369","journal-title":"J Cyber Secur Technol"},{"key":"1185_CR25","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.neucom.2019.11.067","volume":"385","author":"L Qiao","year":"2020","unstructured":"Qiao L, Li X, Umer Q, Guo P (2020) Deep learning based software defect prediction. Neurocomp 385:100\u2013110","journal-title":"Neurocomp"},{"issue":"2","key":"1185_CR26","first-page":"95","volume":"27","author":"R Shatnawi","year":"2015","unstructured":"Shatnawi R (2015) Deriving metrics thresholds using log transformation. J Software: Evol Process 27(2):95\u2013113","journal-title":"J Software: Evol Process"},{"key":"1185_CR27","unstructured":"Shirazi H, Hadavi MA, Hamishagi VS (2005) Vulnerability Prevention in Software Development Process."},{"key":"1185_CR28","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1353-4858(17)30027-2","volume":"3","author":"V Smyth","year":"2017","unstructured":"Smyth V (2017) Software vulnerability management: how intelligence helps reduce the risk. Network Secur 3:10\u201312","journal-title":"Network Secur"},{"issue":"2","key":"1185_CR29","first-page":"100105","volume":"2","author":"K Tameswar","year":"2022","unstructured":"Tameswar K, Suddul G, Dookhitram K (2022) A hybrid deep learning approach with genetic and coral reefs metaheuristics for enhanced defect detection in software. Int J Inf Manage Data Insights 2(2):100105","journal-title":"Int J Inf Manage Data Insights"},{"key":"1185_CR30","unstructured":"Transferable Representation Learning, https:\/\/github.com\/DanielLin1986\/TransferRepresentationLearning. Accessed Mar 2023"},{"key":"1185_CR31","first-page":"102707","volume":"58","author":"M Vijay","year":"2021","unstructured":"Vijay M, Indumathi G (2021) Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications. J Inf Secur Appl 58:102707","journal-title":"J Inf Secur Appl"},{"key":"1185_CR32","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","volume":"187","author":"S Zhao","year":"2021","unstructured":"Zhao S, Li J, Wang J, Zhang Z, Zhu L, Zhang Y (2021) Attackgan: adversarial attack against black-box ids using generative adversarial networks. Procedia Comput Sci 187:128\u2013133","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"1185_CR33","doi-asserted-by":"publisher","first-page":"8053","DOI":"10.1038\/s41598-022-11227-3","volume":"12","author":"X Zhou","year":"2022","unstructured":"Zhou X, Pang J, Yue F, Liu F, Guo J, Liu W, Song Z, Shu G, Xia B, Shan Z (2022) A new method of software vulnerability detection based on a quantum neural network. Sci Rep 12(1):8053","journal-title":"Sci Rep"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-024-01185-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10878-024-01185-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-024-01185-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T20:52:47Z","timestamp":1727297567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10878-024-01185-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1185"],"URL":"https:\/\/doi.org\/10.1007\/s10878-024-01185-z","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"24 May 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"13"}}