{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:13:45Z","timestamp":1740158025921,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T00:00:00Z","timestamp":1523318400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["732253"],"award-info":[{"award-number":["732253"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s12652-018-0784-5","type":"journal-article","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:19:05Z","timestamp":1523341145000},"page":"1927-1936","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Q-Rapids framework for advanced data analysis to improve rapid software development"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"key":"784_CR1","doi-asserted-by":"crossref","unstructured":"Andrysiak T, Saganowski L, Chora\u015b M, Kozik R (2014) Network traffic prediction and anomaly detection based on ARFIMA model. In: Proceedings of SOCO-CISIS-ICEUTE conference. Springer, pp 545\u2013554","DOI":"10.1007\/978-3-319-07995-0_54"},{"key":"784_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.infsof.2015.12.010","volume":"72","author":"EM Arvanitou","year":"2016","unstructured":"Arvanitou EM, Ampatzoglou A, Chatzigeorgiou A, Avgeriou P (2016) Software metrics fluctuation: a property for assisting the metric selection process. Inf Softw Technol 72:110\u2013124","journal-title":"Inf Softw Technol"},{"key":"784_CR3","unstructured":"Capgemini (2017) World quality report 2016\u201317, 8th edition. \n                    https:\/\/www.capgemini.com\/world-quality-report-2016-17\/\n                    \n                  . Accessed 9 Oct 2017"},{"issue":"1","key":"784_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1093\/jigpal\/jzu038","volume":"23","author":"M Chora\u015b","year":"2015","unstructured":"Chora\u015b M, Kozik R (2015) Machine learning techniques applied to detect cyber attacks on web applications. Log J IGPL 23(1):45\u201356","journal-title":"Log J IGPL"},{"issue":"1","key":"784_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s12652-016-0351-x","volume":"8","author":"E Cipolla","year":"2017","unstructured":"Cipolla E, Maniscalco U, Rizzo R, Stabile D, Vella F (2017) Analysis and visualization of meteorological emergencies. J Ambient Intell Humaniz Comput 8(1):57\u201368","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"784_CR7","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11219-015-9289-z","volume":"24","author":"M Felderer","year":"2016","unstructured":"Felderer M, Ramler R (2016) Risk orientation in software testing processes of small and medium enterprises: an exploratory and comparative study. Softw Qual J 24(3):519\u2013548","journal-title":"Softw Qual J"},{"key":"784_CR8","doi-asserted-by":"crossref","unstructured":"Franch X, Raty T, Rytivaara V, Ayala C, Lopez L, Martinez-Fernandez S, Partanen J (2017) Data-driven requirements engineering in agile projects: the Q-Rapids approach. In: 2017 IEEE 25th international requirements engineering conference workshops (REW). IEEE, pp 411\u2013414","DOI":"10.1109\/REW.2017.85"},{"key":"784_CR9","doi-asserted-by":"crossref","unstructured":"Guzm\u00e1n L, Oriol M, Rodr\u00edguez P, Franch X, Jedlitschka A, Oivo M (2017) How can quality awareness support rapid software development? A research preview. In: International working conference on requirements engineering: foundation for software quality. Springer, Cham, pp 167\u2013173","DOI":"10.1007\/978-3-319-54045-0_12"},{"key":"784_CR10","doi-asserted-by":"crossref","unstructured":"Hira A, Boehm B (2016) Function point analysis for software maintenance. In: Proceedings of the 10th ACM\/IEEE international symposium on empirical software engineering and measurement. ACM, p 48","DOI":"10.1145\/2961111.2962613"},{"key":"784_CR11","volume-title":"The economics of software quality","author":"C Jones","year":"2011","unstructured":"Jones C, Bonsignour O (2011) The economics of software quality. Addison-Wesley Professional, Reading"},{"key":"784_CR12","volume-title":"Software testing: a craftsman\u2019s approach","author":"PC Jorgensen","year":"2016","unstructured":"Jorgensen PC (2016) Software testing: a craftsman\u2019s approach. CRC Press, Boca Raton"},{"issue":"6","key":"784_CR13","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s12652-015-0283-x","volume":"6","author":"R Kozik","year":"2015","unstructured":"Kozik R, Chora\u015b M, Flizikowski A, Theocharidou M, Rosato V, Rome E (2015) Advanced services for critical infrastructures protection. J Ambient Intell Hum Comput 6(6):783\u2013795","journal-title":"J Ambient Intell Hum Comput"},{"key":"784_CR14","unstructured":"Kozik R, Chora\u015b M, Puchalski D, Renk R (2017) Data analysis tool supporting software analysis process. In: Proceedings of 14th IEEE international scientific conference on informatics. IEEE, pp 179\u2013184"},{"issue":"4","key":"784_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.4018\/IJHCITP.2017100103","volume":"8","author":"P M\u00e4kiaho","year":"2017","unstructured":"M\u00e4kiaho P, Vartiainen K, Poranen T (2017) MMT: a tool for observing metrics in software projects. Int J Hum Cap Inf Technol Prof (IJHCITP) 8(4):27\u201337","journal-title":"Int J Hum Cap Inf Technol Prof (IJHCITP)"},{"key":"784_CR16","doi-asserted-by":"crossref","unstructured":"Mamun MAA, Berger C, Hansson J (2017) Correlations of software code metrics: an empirical study. In: Proceedings of the 27th international workshop on software measurement and 12th international conference on software process and product measurement. ACM, pp 255\u2013266","DOI":"10.1145\/3143434.3143445"},{"key":"784_CR17","doi-asserted-by":"crossref","unstructured":"Mau\u0161a G, Grbac TG (2017) The stability of threshold values for software metrics in software defect prediction. In: International conference on model and data engineering. Springer, Cham, pp 81\u201395","DOI":"10.1007\/978-3-319-66854-3_7"},{"issue":"5","key":"784_CR18","doi-asserted-by":"publisher","first-page":"2658","DOI":"10.1007\/s10664-016-9472-2","volume":"22","author":"T Menzies","year":"2017","unstructured":"Menzies T, Yang Y, Mathew G, Boehm B, Hihn J (2017) Negative results for software effort estimation. Empir Softw Eng 22(5):2658\u20132683","journal-title":"Empir Softw Eng"},{"key":"784_CR19","unstructured":"QASymphony (2016) The cost of poor software quality \n                    https:\/\/www.qasymphony.com\/blog\/cost-poor-software-quality\/\n                    \n                  . Accessed 9 Oct 2017"},{"key":"784_CR20","unstructured":"Q-Rapids (2017) EU H2020 project. \n                    http:\/\/www.q-rapids.eu\/\n                    \n                  . Accessed 9 Oct 2017"},{"issue":"5","key":"784_CR21","first-page":"1","volume":"38","author":"P Singh","year":"2013","unstructured":"Singh P, Singh S, Kaur J (2013) Tool for generating code metrics for C# source code using abstract syntax tree technique. ACM SIGSOFT Softw Eng Notes 38(5):1\u20136","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"784_CR22","unstructured":"Tovey A (2015) Cyber attacks cost British industry \u00a334bn a year. \n                    http:\/\/www.telegraph.co.uk\/finance\/newsbysector\/industry\/defence\/11663761\/Cyber-attacks-cost-British-industry-34bn-a-year.html\n                    \n                  . Accessed 9 Oct 2017"},{"issue":"5","key":"784_CR23","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MC.2017.144","volume":"50","author":"J Voas","year":"2017","unstructured":"Voas J, Kuhn R (2017) What happened to software metrics? Computer 50(5):88","journal-title":"Computer"},{"key":"784_CR24","doi-asserted-by":"crossref","unstructured":"Vytovtov P, Markov E (2017) Source code quality classification based on software metrics. In: 2017 20th conference of open innovations association (FRUCT). IEEE, pp 505\u2013511","DOI":"10.23919\/FRUCT.2017.8071355"},{"key":"784_CR25","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2015.02.009","volume":"62","author":"S Wagner","year":"2015","unstructured":"Wagner S, Goeb A, Heinemann L, Kl\u00e4s M, Lampasona C, Lochmann K, Trendowicz A (2015) Operationalised product quality models and assessment: the Quamoco approach. Inf Softw Technol 62:101\u2013123","journal-title":"Inf Softw Technol"},{"key":"784_CR26","doi-asserted-by":"crossref","unstructured":"Winter V, Reinke C, Guerrero J (2013) Sextant: a tool to specify and visualize software metrics for Java source-code. In: 2013 4th international workshop on emerging trends in software metrics (WETSoM). IEEE, pp 49\u201355","DOI":"10.1109\/WETSoM.2013.6619336"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0784-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0784-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0784-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T20:28:40Z","timestamp":1554841720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0784-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,10]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["784"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0784-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2018,4,10]]},"assertion":[{"value":"10 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}