{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:47:17Z","timestamp":1762660037353,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11334-020-00383-2","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T15:03:36Z","timestamp":1611846216000},"page":"17-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["The realist approach for evaluation of computational intelligence in software engineering"],"prefix":"10.1007","volume":"17","author":[{"given":"Raghavendra Rao","family":"Althar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4118-2480","authenticated-orcid":false,"given":"Debabrata","family":"Samanta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"key":"383_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s41019-016-0019-8","volume":"2","author":"LB Othmane","year":"2016","unstructured":"Othmane LB, Chehrazi G, Bodden E, Tsalovski P, Brucker AD (2016) Time for addressing software security issues: prediction models and impacting factors. Springer nature. Data Sci Eng 2:107\u2013124","journal-title":"Data Sci Eng"},{"key":"383_CR2","doi-asserted-by":"crossref","unstructured":"Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker A, Miseldine P (2015) Factors impacting the effort required to x security vulnerabilities. In: Proceedings of information security conference (ISC 2015), Trondheim, Norway, pp 102\u2013119","DOI":"10.1007\/978-3-319-23318-5_6"},{"key":"383_CR3","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/S0950-5849(96)00006-7","volume":"39","author":"AR Gray","year":"1997","unstructured":"Gray AR, MacDonell SG (1997) Comparison of techniques for developing predictive models of software metrics. Inf Softw Technol 39:425\u2013437","journal-title":"Inf Softw Technol"},{"key":"383_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.infsof.2011.09.002","volume":"54","author":"J Wen","year":"2012","unstructured":"Wen J, Li S, Lin Z, Hu Y, Huang C (2012) Systematic literature review of machine learning based software development effort estimation models. Inf Softw Technol 54:41\u201359","journal-title":"Inf Softw Technol"},{"key":"383_CR5","doi-asserted-by":"crossref","unstructured":"Zhang F, Khomh F, Zou Y, Hassan A (2012) An empirical study on factors impacting bug fixing time. In: 19th Researching conference on reverse engineering (WCRE), Kingston, Canada, pp 225\u2013234","DOI":"10.1109\/WCRE.2012.32"},{"key":"383_CR6","doi-asserted-by":"crossref","unstructured":"Menzies T, Butcher A, Marcus A, Zimmermann T, Cok D (2011) Local versus global models for effort estimation and defect prediction. In: Proceedings of the 2011 26th IEEE\/ACM international conference on automated software engineering. ASE '11, Washington, DC, pp 343\u2013351","DOI":"10.1109\/ASE.2011.6100072"},{"issue":"1","key":"383_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies T, Greenwald J, Frank A (2006) Data mining static code attributes to learn defect predictors. IEEE Trans Software Eng 33(1):2\u201313","journal-title":"IEEE Trans Software Eng"},{"issue":"2","key":"383_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10664-008-9064-x","volume":"14","author":"R Hewett","year":"2009","unstructured":"Hewett R, Kijsanayothin P (2009) On modeling software defect repair time. Empir Softw Eng 14(2):165","journal-title":"Empir Softw Eng"},{"key":"383_CR9","doi-asserted-by":"crossref","unstructured":"Ben Othmane L, Chehrazi G, Bodden E, Tsalovski P, Brucker AD, Miseldine P (2015) Factors impacting the effort required to fix security vulnerabilities. In: International conference on information security, Springer Cham, pp 102\u2013119","DOI":"10.1007\/978-3-319-23318-5_6"},{"key":"383_CR10","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/B978-0-12-411519-4.00016-1","volume-title":"The art and science of analyzing software data","author":"A Bener","year":"2015","unstructured":"Bener A, Misirli A, Caglayan B, Kocaguneli E, Calikli G (2015) Lessons Learned from software analytics in practice. The art and science of analyzing software data, 1st edn. Elsevier, Waltham, pp 453\u2013489","edition":"1"},{"key":"383_CR11","unstructured":"Hamill M, Goseva-Popstojanova K (2014) Software faults fixing effort: analysis and prediction. Technical Report 20150001332, NASA Goddard Space Flight Center, Greenbelt, MD USA"},{"key":"383_CR12","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s10664-014-9300-5","volume":"20","author":"EKT Menzies","year":"2015","unstructured":"Menzies EKT, Mendes E (2015) Transfer learning in effort estimation, empirical software engineering. Empir Softw Eng 20:813\u2013843","journal-title":"Empir Softw Eng"},{"key":"383_CR13","unstructured":"Javier Lopez, Chris J. Mitchell (Eds.) (2015) Factors impacting the Effort required to fix security vulnerabilities an industrial case study. In: 18th international conference, ISC 2015 Trondheim, Norway, September 9\u201311, 2015 Proceedings"},{"key":"383_CR14","first-page":"453","volume-title":"Lessons learned from software analytics in practice","author":"A Bener","year":"2015","unstructured":"Bener A, Misirli AT, Caglayan B, Kocaguneli E, Calikli G (2015) Lessons learned from software analytics in practice. Elsevier, The art and science of analyzing software data, pp 453\u2013489"},{"issue":"6","key":"383_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TSE.2014.2321179","volume":"40","author":"AT Misirli","year":"2014","unstructured":"Misirli AT, Bener AB (2014) Bayesian networks for evidence-based decision-making in software engineering. IEEE Trans Software Eng 40(6):533\u2013554","journal-title":"IEEE Trans Software Eng"},{"issue":"4","key":"383_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3092566","volume":"50","author":"SM Ghaffarian","year":"2017","unstructured":"Ghaffarian SM, Shahriari HR (2017) Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput Surv 50(4):1\u201336","journal-title":"ACM Comput Surv"},{"issue":"1","key":"383_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10664-011-9190-8","volume":"18","author":"Y Shin","year":"2013","unstructured":"Shin Y, Williams L (2013) Can traditional fault prediction models be used for vulnerability prediction? Empir Softw Eng 18(1):25\u201359","journal-title":"Empir Softw Eng"},{"key":"383_CR18","doi-asserted-by":"crossref","unstructured":"Shin Y, Williams L (2011) An initial study on the use of execution complexity metrics as indicators of software vulnerabilities. In: Proceedings of the 7th international research shop on software engineering for secure systems (SESS'11). ACM, pp 1\u20137","DOI":"10.1145\/1988630.1988632"},{"key":"383_CR19","doi-asserted-by":"crossref","unstructured":"Bosu A, Carver JC, Hafiz M, Hilley P, Janni D (2014). Identifying the characteristics of vulnerable code changes: an empirical study. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pp 257\u2013268","DOI":"10.1145\/2635868.2635880"},{"key":"383_CR20","doi-asserted-by":"crossref","unstructured":"Long F, Rinard M (2016) Automatic patch generation by learning correct code. In: Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, pp 298\u2013312","DOI":"10.1145\/2837614.2837617"},{"key":"383_CR21","doi-asserted-by":"crossref","unstructured":"Yamaguchi F, Lottmann M, Rieck K (2012) Generalized vulnerability extrapolation using abstract syntax trees. In: Proceedings of the 28th annual computer security applications conference, pp 359\u2013368","DOI":"10.1145\/2420950.2421003"},{"key":"383_CR22","unstructured":"Charu CA, Wang H (2010) A survey of clustering algorithms for graph data. In: Managing and mining graph data. Springer, pp 275\u2013301"},{"key":"383_CR23","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-319-07821-2_13","volume-title":"Frequent pattern mining","author":"H Cheng","year":"2014","unstructured":"Cheng H, Yan X, Han J (2014) Mining graph patterns. Frequent pattern mining. Springer, Cham, pp 307\u2013338"},{"issue":"01","key":"383_CR24","doi-asserted-by":"publisher","first-page":"1450001","DOI":"10.1142\/S0218001414500013","volume":"28","author":"P Foggia","year":"2014","unstructured":"Foggia P, Percannella G, Vento M (2014) Graph matching and learning in pattern recognition in the last 10 years. Int J Pattern Recognit Artif Intell 28(01):1450001","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"383_CR25","doi-asserted-by":"crossref","unstructured":"Peng H, Mou L, Li G, Liu Y, Zhang L, Jin Z (2015) Building program vector representations for deep learning. In: International conference on knowledge science, engineering and management, Springer, Cham, pp 547\u2013553","DOI":"10.1007\/978-3-319-25159-2_49"},{"key":"383_CR26","doi-asserted-by":"crossref","unstructured":"Younis A, Malaiya Y, Anderson C, Ray I. (2016) To fear or not to fear that is the question: code characteristics of a vulnerable function with an existing exploit. In: Proceedings of the sixth ACM conference on data and application security and privacy, pp 97\u2013104","DOI":"10.1145\/2857705.2857750"},{"issue":"6","key":"383_CR27","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1109\/TDSC.2014.2373377","volume":"12","author":"LK Shar","year":"2014","unstructured":"Shar LK, Briand LC, Tan HBK (2014) Web application vulnerability prediction using hybrid program analysis and machine learning. IEEE Trans Dependable Secure Comput 12(6):688\u2013707","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"383_CR28","unstructured":"Chorowski J (2012) Learning understandable classier models. Ph.D., Dissertation, University of Louisville. Codenomicon"},{"issue":"1","key":"383_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2594473.2594475","volume":"15","author":"AA Freitas","year":"2014","unstructured":"Freitas AA (2014) Comprehensible classification models: a position paper. ACM SIGKDD Explor Newsl 15(1):1\u201310","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"383_CR30","first-page":"418","volume-title":"European Conference on machine learning","author":"A Van Assche","year":"2007","unstructured":"Van Assche A, Blockeel H (2007) Seeing the forest through the trees: Learning a comprehensible model from an ensemble. European Conference on machine learning. Springer, Berlin, pp 418\u2013429"},{"key":"383_CR31","doi-asserted-by":"crossref","unstructured":"Riaz M, King J, Slankas J, Williams L (2014) Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. In: 2014 IEEE 22nd international requirements engineering conference (RE). IEEE, pp 183\u2013192","DOI":"10.1109\/RE.2014.6912260"},{"key":"383_CR32","unstructured":"Thushan G (2018) Intuitive guide to latent Dirichlet allocation. https:\/\/towardsdatascience.com\/light-on-math-machine-learning-intuitive-guide-to-latent-dirichlet-allocation-437c81220158. Accessed 10 Dec 2020"},{"key":"383_CR33","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s11334-019-00337-3","volume":"16","author":"R Deb","year":"2020","unstructured":"Deb R, Roy S (2020) Dynamic vulnerability assessments of software-defined networks. Innov Syst Softw Eng 16:45\u201351. https:\/\/doi.org\/10.1007\/s11334-019-00337-3","journal-title":"Innov Syst Softw Eng"},{"key":"383_CR34","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s11334-018-0319-4","volume":"14","author":"M Kassab","year":"2018","unstructured":"Kassab M, Mazzara M, Lee J et al (2018) Software architectural patterns in practice: an empirical study. Innov Syst Softw Eng 14:263\u2013271. https:\/\/doi.org\/10.1007\/s11334-018-0319-4","journal-title":"Innov Syst Softw Eng"},{"key":"383_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7965-3-7","volume-title":"Multimedia technologies in the Internet of Things environment Studies in big data","author":"RR Althar","year":"2020","unstructured":"Althar RR, Samanta D (2020) Building Intelligent Integrated Development Environment for IoT in the Context of Statistical Modeling for Software Source Code. In: Kumar R, Sharma R, Pattnaik PK (eds) Multimedia technologies in the Internet of Things environment Studies in big data, vol 79. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-7965-3-7"},{"key":"383_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01797-3","author":"V Gomathy","year":"2020","unstructured":"Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor net researches. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-01797-3","journal-title":"J Ambient Intell Human Comput"},{"key":"383_CR37","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11334-020-00366-3","volume":"16","author":"A Idani","year":"2020","unstructured":"Idani A, Ledru Y, Vega G (2020) Alliance of model-driven engineering with a proof-based formal approach. Innov Syst Softw Eng 16:289\u2013307. https:\/\/doi.org\/10.1007\/s11334-020-00366-3","journal-title":"Innov Syst Softw Eng"},{"key":"383_CR38","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11334-020-00364-5","volume":"16","author":"T Given-Wilson","year":"2020","unstructured":"Given-Wilson T, Jafri N, Legay A (2020) Combined software and hardware fault injection vulnerability detection. Innov Syst Softw Eng 16:101\u2013120. https:\/\/doi.org\/10.1007\/s11334-020-00364-5","journal-title":"Innov Syst Softw Eng"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-020-00383-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-020-00383-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-020-00383-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T12:44:26Z","timestamp":1697719466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-020-00383-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["383"],"URL":"https:\/\/doi.org\/10.1007\/s11334-020-00383-2","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}