{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T04:11:10Z","timestamp":1772943070340,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s13198-025-03017-7","type":"journal-article","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T08:38:00Z","timestamp":1761381480000},"page":"906-923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the use of exemplary data for software vulnerability prediction"],"prefix":"10.1007","volume":"17","author":[{"given":"Patrick Kwaku","family":"Kudjo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5629-2661","authenticated-orcid":false,"given":"Solomon","family":"Mensah","sequence":"additional","affiliation":[]},{"given":"Ebenezer","family":"Owusu","sequence":"additional","affiliation":[]},{"given":"Justice Kwame","family":"Appati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,25]]},"reference":[{"key":"3017_CR1","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.jocs.2017.07.018","volume":"25","author":"LM Abualigah","year":"2017","unstructured":"Abualigah LM, Khader AT, Hanandeh ES (2017) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456","journal-title":"J Comput Sci"},{"key":"3017_CR2","doi-asserted-by":"publisher","unstructured":"Amasaki AS and Lokan C (2016) Towards better selection between moving windows and growing portfolio. In: Proceedings of the 17th international conference product-focused software process improvement: PROFES, Trondheim: Springer, pp. 627\u2013630. https:\/\/doi.org\/10.1007\/978-3-319-49094-6","DOI":"10.1007\/978-3-319-49094-6"},{"key":"3017_CR3","doi-asserted-by":"publisher","DOI":"10.37190\/e-Inf230102","author":"D Bassi","year":"2023","unstructured":"Bassi D, Singh H (2023) The effect of dual hyperparameter optimization on software vulnerability prediction models. E-Informatica Softw Eng J. https:\/\/doi.org\/10.37190\/e-Inf230102","journal-title":"E-Informatica Softw Eng J"},{"issue":"1","key":"3017_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"3017_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ins.2015.05.019","volume":"318","author":"C-H Chen","year":"2015","unstructured":"Chen C-H (2015) Feature selection for clustering using instance-based learning by exploring the nearest and farthest neighbors. Inf Sci 318:14\u201327","journal-title":"Inf Sci"},{"key":"3017_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1497577.1497582","volume":"3","author":"B-C Chen","year":"2009","unstructured":"Chen B-C, Ramakrishnan R, Shavlik JW et al (2009) Bellwether analysis: searching for cost-effective query-defined predictors in large databases. ACM Trans Knowl Discov Data (TKDD) 3:5. https:\/\/doi.org\/10.1145\/1497577.1497582","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"3017_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TR.2019.2924932","volume":"69","author":"X Chen","year":"2019","unstructured":"Chen X, Zhao Y, Cui Z, Meng G, Liu Y, Wang Z (2019) Large-scale empirical studies on effort-aware security vulnerability prediction methods. IEEE Trans Reliab 69:70","journal-title":"IEEE Trans Reliab"},{"issue":"9","key":"3017_CR8","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TKDE.2005.149","volume":"17","author":"EF Combarro","year":"2005","unstructured":"Combarro EF, Montanes E, Diaz I et al (2005) Introducing a family of linear measures for feature selection in text categorization. IEEE Trans Knowl Data Eng 17(9):1223\u20131232","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"3017_CR9","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TSE.2022.3171202","volume":"49","author":"R Croft","year":"2023","unstructured":"Croft R, Xie Y, Babar MA (2023) Data preparation for software vulnerability prediction: a systematic literature review. IEEE Trans Softw Eng 49(3):1044\u20131063. https:\/\/doi.org\/10.1109\/TSE.2022.3171202","journal-title":"IEEE Trans Softw Eng"},{"key":"3017_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102948","author":"K Filus","year":"2023","unstructured":"Filus K, Doma\u0144ska J (2023) Software vulnerabilities in TensorFlow-based deep learning applications. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2022.102948","journal-title":"Comput Secur"},{"key":"3017_CR11","doi-asserted-by":"publisher","unstructured":"Fu M (2023) Toward more effective deep learning-based automated software vulnerability prediction, classification, and repair. Inst Electr Electron Eng (IEEE), 2023, pp. 208\u2013212. https:\/\/doi.org\/10.1109\/icse-companion58688.2023.00057.","DOI":"10.1109\/icse-companion58688.2023.00057"},{"issue":"no. 1","key":"3017_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10346-3","volume":"29","author":"M Fu","year":"2024","unstructured":"Fu M et al (2024) Aibughunter: a practical tool for predicting, classifying and repairing software vulnerabilities. Empir Softw Eng 29(1):4. https:\/\/doi.org\/10.1007\/s10664-023-10346-3","journal-title":"Empir Softw Eng"},{"key":"3017_CR13","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, and Hassan AE (2017) A large-scale study of the impact of feature selection techniques on defect classification models. In: Proceedings of the 14th IEEE\/ACM international conference on mining software repositories (MSR), 2017, pp. 146\u2013157","DOI":"10.1109\/MSR.2017.18"},{"key":"3017_CR14","doi-asserted-by":"crossref","unstructured":"Gu Q, Zhu L, and Cai Z (2009) Evaluation measures of the classification performance of imbalanced data sets. In: International symposium on intelligent computation and applications, 2009, pp. 461\u2013471","DOI":"10.1007\/978-3-642-04962-0_53"},{"key":"3017_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11:10\u201318","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"3017_CR16","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1142\/S0218194019500311","volume":"6","author":"A Hamdy","year":"2019","unstructured":"Hamdy A, El-Laithy A (2019) SMOTE and feature selection for more effective bug severity prediction. Int J Softw Eng Knowl Eng 6:897\u2013919","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"3017_CR17","doi-asserted-by":"crossref","unstructured":"Han Z, Li X, Xing Z, et al. (2017) Learning to predict severity of software vulnerability using only vulnerability description. In: IEEE International conference on software maintenance and evolution (ICSME), IEEE, 2017, pp. 125\u2013136","DOI":"10.1109\/ICSME.2017.52"},{"issue":"2","key":"3017_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10664-009-9117-9","volume":"15","author":"H Hata","year":"2010","unstructured":"Hata H, Mizuno O, Kikuno T (2010) Fault-prone module detection using large-scale text features based on spam filtering. Empir Softw Eng 15(2):147\u2013165","journal-title":"Empir Softw Eng"},{"key":"3017_CR19","doi-asserted-by":"publisher","first-page":"28291","DOI":"10.1109\/ACCESS.2019.2900462","volume":"7","author":"G Huang","year":"2019","unstructured":"Huang G, Li Y, Wang Q, Ren J, Cheng Y, Zhao X (2019) Automatic classification method for software vulnerability based on deep neural network. IEEE Access 7:28291\u201328298. https:\/\/doi.org\/10.1109\/ACCESS.2019.2900462","journal-title":"IEEE Access"},{"key":"3017_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ipl.2015.07.005","volume":"116","author":"S-Y Jiang","year":"2016","unstructured":"Jiang S-Y, Wang L-X (2016) Efficient feature selection based on correlation measure between continuous and discrete features. Inf Process Lett 116:203\u2013215","journal-title":"Inf Process Lett"},{"key":"3017_CR21","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar TM, Golawala M, and Van Hulse J (2007) An empirical study of learning from imbalanced data using random forest. In: Proceedings of the 19th IEEE international conference on tools with artificial intelligence, ICTAI, 2007, pp. 310\u2013317","DOI":"10.1109\/ICTAI.2007.46"},{"issue":"1","key":"3017_CR22","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/s10664-014-9354-4","volume":"21","author":"B Kitchenham","year":"2016","unstructured":"Kitchenham B, Madeyski L, Budgen D et al (2016) Robust statistical methods for empirical software engineering. Empir Softw Eng 21(1):212\u2013259. https:\/\/doi.org\/10.1007\/s10664-014-9354-4","journal-title":"Empir Softw Eng"},{"key":"3017_CR23","doi-asserted-by":"crossref","unstructured":"Kohavi R and John GH (1995) Automatic parameter selection by minimizing estimated error. In: Machine learning proceedings, 1995, ed: Elsevier, pp. 304\u2013312","DOI":"10.1016\/B978-1-55860-377-6.50045-1"},{"key":"3017_CR24","doi-asserted-by":"crossref","unstructured":"Kudjo PK, and Chen J (2019) A cost-effective strategy for software vulnerability prediction based on bellwether analysis. In: Proceedings of the 28th ACM SIGSOFT international symposium on software testing and analysis 2019, pp. 424\u2013427","DOI":"10.1145\/3293882.3338985"},{"key":"3017_CR25","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0306-4573(02)00022-5","volume":"39","author":"O-W Kwon","year":"2003","unstructured":"Kwon O-W, Lee J-H (2003) Text categorization based on k-nearest neighbor approach for website classification. Inf Process Manag 39:25\u201344","journal-title":"Inf Process Manag"},{"key":"3017_CR26","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann S, Baesens B, Mues C et al (2008) Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Trans Softw Eng 34:485\u2013496","journal-title":"IEEE Trans Softw Eng"},{"key":"3017_CR27","doi-asserted-by":"publisher","unstructured":"Li J et al. (2023) A two-stage framework for ambiguous classification in software engineering. In: Proceedings\u2014international symposium on software reliability engineering, ISSRE, IEEE Computer Society, 2023, pp. 275\u2013286. https:\/\/doi.org\/10.1109\/ISSRE59848.2023.00070","DOI":"10.1109\/ISSRE59848.2023.00070"},{"issue":"2","key":"3017_CR28","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1007\/s10664-016-9446-4","volume":"22","author":"C Lokan","year":"2016","unstructured":"Lokan C, Mendes E (2016) Investigating the use of moving windows to improve software effort prediction: a replicated study. Empir Softw Eng 22(2):716\u2013767","journal-title":"Empir Softw Eng"},{"key":"3017_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111283","author":"F Lomio","year":"2022","unstructured":"Lomio F, Iannone E, De Lucia A, Palomba F, Lenarduzzi V (2022) Just-in-time software vulnerability detection: are we there yet? J Syst Softw. https:\/\/doi.org\/10.1016\/j.jss.2022.111283","journal-title":"J Syst Softw"},{"issue":"2","key":"3017_CR30","doi-asserted-by":"publisher","first-page":"464","DOI":"10.3758\/s13428-019-01246-w","volume":"52","author":"P Mair","year":"2020","unstructured":"Mair P, Wilcox R (2020) Robust statistical methods in R using the WRS2 package. Behav Res Methods 52(2):464\u2013488. https:\/\/doi.org\/10.3758\/s13428-019-01246-w","journal-title":"Behav Res Methods"},{"issue":"9","key":"3017_CR31","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1002\/smr.2488","volume":"34","author":"S Mensah","year":"2022","unstructured":"Mensah S, Kudjo PK (2022) A classification scheme to improve conclusion instability using Bellwether moving windows. J Softw Evol Process 34(9):2022","journal-title":"J Softw Evol Process"},{"issue":"3","key":"3017_CR32","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1109\/TR.2018.2839718","volume":"67","author":"S Mensah","year":"2018","unstructured":"Mensah S, Keung J, MacDonell SG, Bosu MF, Bennin KE (2018) Investigating the significance of the bellwether effect to improve software effort prediction: further empirical study. IEEE Trans Reliab 67(3):1176\u20131198. https:\/\/doi.org\/10.1109\/TR.2018.2839718","journal-title":"IEEE Trans Reliab"},{"key":"3017_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s42488-024-00117-0","author":"S Mensah","year":"2024","unstructured":"Mensah S, Kudjo PK, Brown SA, Dick EA, Koffie-Ocloo DW (2024) An empirical study to test the significant effect of bellwethers on predictive modeling in smart homes. J Data Inf Manag. https:\/\/doi.org\/10.1007\/s42488-024-00117-0","journal-title":"J Data Inf Manag"},{"key":"3017_CR34","doi-asserted-by":"publisher","unstructured":"Mensah S, Keung J, Bosu M, Bennin K, and Kudjo PK (2017) A stratification and sampling model for bellwether moving window. In: Proceedings of the 29th international conference on software engineering and knowledge engineering (SEKE), Pittsburgh, USA, 2017, pp. 481\u2013486. https:\/\/doi.org\/10.18293\/SEKE2017-126","DOI":"10.18293\/SEKE2017-126"},{"key":"3017_CR35","doi-asserted-by":"publisher","unstructured":"Mensah S, Keung J, Macdonell SG, Bosu MF, and Bennin KE (2017) Investigating the significance of Bellwether effect to improve software effort estimation. In: 2017 IEEE International conference on software quality, reliability and security (QRS), 2017, pp. 340\u2013351. https:\/\/doi.org\/10.1109\/QRS.2017.44","DOI":"10.1109\/QRS.2017.44"},{"key":"3017_CR36","unstructured":"Menzies T, DiStefano J, Orrego A et al. (2004) Assessing predictors of software defects. In: Proc workshop predictive software models"},{"key":"3017_CR37","doi-asserted-by":"crossref","unstructured":"Munaiah N (2018) Assisted discovery of software vulnerabilities. In: Proceedings of the 40th international conference on software engineering: companion proceedings, pp. 464\u2013467","DOI":"10.1145\/3183440.3183453"},{"key":"3017_CR38","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.jss.2016.02.048","volume":"117","author":"SS Murtaza","year":"2016","unstructured":"Murtaza SS, Khreich W, Hamou-Lhadj et al (2016) Mining trends and patterns of software vulnerabilities. J Syst Softw 117:218\u2013228. https:\/\/doi.org\/10.1016\/j.jss.2016.02.048","journal-title":"J Syst Softw"},{"key":"3017_CR39","doi-asserted-by":"crossref","unstructured":"Nierstrasz O, Osman H, and Ghafari M (2017) Automatic feature selection by regularization to improve bug prediction accuracy. In: IEEE workshop on machine learning techniques for software quality evaluation (MaLTeSQuE), 2017, pp. 27\u201332","DOI":"10.1109\/MALTESQUE.2017.7882013"},{"key":"3017_CR40","doi-asserted-by":"crossref","unstructured":"Pang Y, Xue X, and Namin AS (2015) Predicting vulnerable software components through n-gram analysis and statistical feature selection. In: Proceedings of the 14th IEEE international conference on machine learning and applications (ICMLA), 2015, pp. 543\u2013548","DOI":"10.1109\/ICMLA.2015.99"},{"key":"3017_CR41","doi-asserted-by":"crossref","unstructured":"Pang Y, Xue X, and Wang H (2017) Predicting vulnerable software components through deep neural network. In: International conference on deep learning technologies, pp. 6\u201310","DOI":"10.1145\/3094243.3094245"},{"key":"3017_CR42","unstructured":"Quinlan JR (2014) C4. 5: programs for machine learning, Elsevier"},{"key":"3017_CR43","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.chb.2019.09.028","volume":"103","author":"J Ruohonen","year":"2020","unstructured":"Ruohonen J, Hyrynsalmi S, Lepp\u00e4nen V (2020) A mixed methods probe into the direct disclosure of software vulnerabilities. Comput Human Behav 103:161\u2013173","journal-title":"Comput Human Behav"},{"key":"3017_CR44","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato R, Walden J (2014) Predicting vulnerable software components via text mining. IEEE Trans Software Eng 40:993\u20131006","journal-title":"IEEE Trans Software Eng"},{"key":"3017_CR45","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/TSE.2014.2340398","volume":"40","author":"R Scandariato","year":"2014","unstructured":"Scandariato R, Walden J, Hovsepyan A, Joosen W (2014) Predicting vulnerable software components via text mining. IEEE Trans Softw Eng 40:993\u20131006","journal-title":"IEEE Trans Softw Eng"},{"key":"3017_CR46","doi-asserted-by":"crossref","unstructured":"Shin Y and Williams L (2008) An empirical model to predict security vulnerabilities using code complexity metrics. In: Proceedings of the 2nd ACM-IEEE international symposium on empirical software engineering and measurement, 2008, pp. 315\u2013317","DOI":"10.1145\/1414004.1414065"},{"issue":"1","key":"3017_CR47","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TR.2016.2630503","volume":"66","author":"J Stuckman","year":"2017","unstructured":"Stuckman J, Walden J, Scandariato R (2017) The effect of dimensionality reduction on software vulnerability prediction models. IEEE Trans Reliab 66(1):17\u201337","journal-title":"IEEE Trans Reliab"},{"key":"3017_CR48","doi-asserted-by":"crossref","unstructured":"Sultana KZ (2017) Towards a software vulnerability prediction model using traceable code patterns and software metrics. In: Proceedings of the 32nd IEEE\/ACM international conference on automated software engineering (ASE), pp. 1022\u20131025","DOI":"10.1109\/ASE.2017.8115724"},{"key":"3017_CR49","doi-asserted-by":"crossref","unstructured":"Tang Y, Zhao F, Yang Y, Lu H et al. (2015) Predicting vulnerable components via text mining or software metrics? an effort-aware perspective. In: IEEE international conference on software quality, reliability and security (QRS), 2015. pp. 27\u201336","DOI":"10.1109\/QRS.2015.15"},{"key":"3017_CR50","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jss.2018.03.053","volume":"143","author":"H Valdivia-Garcia","year":"2018","unstructured":"Valdivia-Garcia H, Shihab E, Nagappan M (2018) Characterizing and predicting blocking bugs in open source projects. J Syst Softw 143:44\u201358","journal-title":"J Syst Softw"},{"key":"3017_CR51","doi-asserted-by":"crossref","unstructured":"Walden J, Stuckman J, and Scandariato R (2014) Predicting vulnerable components: software metrics vs text mining. In: Proceedings of the 25th IEEE international symposium on software reliability engineering (ISSRE), pp. 23\u201333, 2014","DOI":"10.1109\/ISSRE.2014.32"},{"key":"3017_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103070","author":"Q Wang","year":"2023","unstructured":"Wang Q, Gao Y, Ren J, Zhang B (2023) An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2022.103070","journal-title":"Comput Secur"},{"key":"3017_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106809","author":"L Wartschinski","year":"2022","unstructured":"Wartschinski L, Noller Y, Vogel T, Kehrer T, Grunske L (2022) VUDENC: vulnerability detection with deep learning on a natural codebase for Python. Inf Softw Technol. https:\/\/doi.org\/10.1016\/j.infsof.2021.106809","journal-title":"Inf Softw Technol"},{"issue":"3","key":"3017_CR54","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1093\/biomet\/29.3-4.350","volume":"29","author":"BL Welch","year":"1938","unstructured":"Welch BL (1938) The significance of the difference between two means when the population variances are unequal. Biometrika 29(3):350\u2013362. https:\/\/doi.org\/10.1093\/biomet\/29.3-4.350","journal-title":"Biometrika"},{"key":"3017_CR55","doi-asserted-by":"crossref","unstructured":"Wu F, Wang J, Liu J et al. (2017) Vulnerability detection with deep learning. In: Proceedings of the 3rd IEEE international conference on computer and communications (ICCC), 2017, pp. 1298\u20131302","DOI":"10.1109\/CompComm.2017.8322752"},{"issue":"1","key":"3017_CR56","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/biomet\/61.1.165","volume":"61","author":"KK Yuen","year":"1974","unstructured":"Yuen KK (1974) The two-sample trimmed t for unequal population variances. Biometrika 61(1):165\u2013170. https:\/\/doi.org\/10.1093\/biomet\/61.1.165","journal-title":"Biometrika"},{"key":"3017_CR57","doi-asserted-by":"publisher","first-page":"57163","DOI":"10.1109\/ACCESS.2019.2913688","volume":"7","author":"J Zeng","year":"2019","unstructured":"Zeng J, Liu M, Fu X et al (2019) Curvature bag of words model for shape recognition. IEEE Access 7:57163\u201357171","journal-title":"IEEE Access"},{"issue":"no. 4","key":"3017_CR58","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13042-010-0001-0","volume":"1","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Jin R, Zhou ZH (2010) Understanding bag-of-words model: a statistical framework. Int J Mach Learn Cybern 1(4):43\u201352","journal-title":"Int J Mach Learn Cybern"},{"key":"3017_CR59","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, Gall H, et al. Cross-project defect prediction: a large-scale experiment on data vs. domain vs. Process. In: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ser. ESEC\/FSE \u201909. New York, NY, USA: ACM, 2009, pp. 91\u2013100","DOI":"10.1145\/1595696.1595713"},{"key":"3017_CR60","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, and Williams L (2010) Searching for a needle in a haystack: predicting security vulnerabilities for Windows Vista. In: Proceedings of the 3rd IEEE international conference on software testing, verification and validation (ICST), 2010, pp. 421\u2013428","DOI":"10.1109\/ICST.2010.32"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-03017-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-03017-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-03017-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:23:02Z","timestamp":1772886182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-03017-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,25]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["3017"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-03017-7","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,25]]},"assertion":[{"value":"13 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest declared by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors consented to take part in this study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors have consented to publish this study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}