{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:22:57Z","timestamp":1742984577133,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031148583"},{"type":"electronic","value":"9783031148590"}],"license":[{"start":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T00:00:00Z","timestamp":1661644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T00:00:00Z","timestamp":1661644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-14859-0_7","type":"book-chapter","created":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T17:02:37Z","timestamp":1661619757000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Feature Extraction to\u00a0Vulnerability Prediction Problem"],"prefix":"10.1007","author":[{"given":"Vitor Antonio","family":"Apolin\u00e1rio","sequence":"first","affiliation":[]},{"given":"Guilherme Dal","family":"Bianco","sequence":"additional","affiliation":[]},{"given":"Denio","family":"Duarte","sequence":"additional","affiliation":[]},{"given":"Valderi Reis Quietinho","family":"Leithardt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,28]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"150672","DOI":"10.1109\/ACCESS.2020.3016774","volume":"8","author":"Z Bilgin","year":"2020","unstructured":"Bilgin, Z., Ersoy, M.A., Soykan, E.U., Tomur, E., \u00c7omak, P., Kara\u00e7ay, L.: Vulnerability prediction from source code using machine learning. IEEE Access 8, 150672\u2013150684 (2020)","journal-title":"IEEE Access"},{"key":"7_CR2","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-97556-6_3","volume-title":"Data Science in Practice","author":"D Duarte","year":"2019","unstructured":"Duarte, D., St\u00e5hl, N.: Machine learning: a concise overview. In: Said, A., Torra, V. (eds.) Data Science in Practice. SBD, vol. 46, pp. 27\u201358. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-97556-6_3"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Jabeen, G., et al.: Machine learning techniques for software vulnerability prediction: a comparative study. Appl. Intell. 1\u201322 (2022). https:\/\/doi.org\/10.1007\/s10489-022-03350-5","DOI":"10.1007\/s10489-022-03350-5"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Kudjo, P.K., Chen, J.: A cost-effective strategy for software vulnerability prediction based on bellwether analysis. In: Proceedings of the 28th ACM SIGSOFT, pp. 424\u2013427 (2019)","DOI":"10.1145\/3293882.3338985"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Li, Z., Shao, Y.: A survey of feature selection for vulnerability prediction using feature-based machine learning. In: Proceedings of the 2019 ICML, pp. 36\u201342 (2019)","DOI":"10.1145\/3318299.3318345"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1016\/j.eswa.2013.09.005","volume":"41","author":"B Lika","year":"2014","unstructured":"Lika, B., Kolomvatsos, K., Hadjiefthymiades, S.: Facing the cold start problem in recommender systems. Expert Syst. Appl. 41(4), 2065\u20132073 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1017\/S1351324909005129","volume":"16","author":"C Manning","year":"2010","unstructured":"Manning, C., Raghavan, P., Sch\u00fctze, H.: Introduction to information retrieval. Nat. Lang. Eng. 16(1), 100\u2013103 (2010)","journal-title":"Nat. Lang. Eng."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Morrison, P., Herzig, K., Murphy, B., Williams, L.: Challenges with applying vulnerability prediction models. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 1\u20139 (2015)","DOI":"10.1145\/2746194.2746198"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Nam, J., Kim, S.: Clami: Defect prediction on unlabeled datasets (t). In: 2015 30th IEEE\/ACM ASE, pp. 452\u2013463. IEEE (2015)","DOI":"10.1109\/ASE.2015.56"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Pereira, F., Crocker, P., Leithardt, V.R.: Padres: tool for privacy, data regulation and security. SoftwareX 17, 100895 (2022)","DOI":"10.1016\/j.softx.2021.100895"},{"key":"7_CR11","unstructured":"Settles, B.: Active learning literature survey. Computer Sciences Technical report 1648, University of Wisconsin-Madison (2009)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Shamal, P., Rahamathulla, K., Akbar, A.: A study on software vulnerability prediction model. In: 2017 WiSPNET, pp. 703\u2013706. IEEE (2017)","DOI":"10.1109\/WiSPNET.2017.8299852"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-030-87687-6","volume-title":"New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence","author":"JC Suzin","year":"2022","unstructured":"Suzin, J.C., Zeferino, C.A., Leithardt, V.R.Q.: Digital statelessness. In: de Paz Santana, J.F., de la Iglesia, D.H., L\u00f3pez Rivero, A.J. (eds.) New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence, pp. 178\u2013189. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-87687-6"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Theisen, C., Herzig, K., Morrison, P., Murphy, B., Williams, L.: Approximating attack surfaces with stack traces. In: 2015 IEEE\/ACM 37th ICSE, vol. 2, pp. 199\u2013208. IEEE (2015)","DOI":"10.1109\/ICSE.2015.148"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Walden, J., Stuckman, J., Scandariato, R.: Predicting vulnerable components: software metrics vs text mining. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering, pp. 23\u201333. IEEE (2014)","DOI":"10.1109\/ISSRE.2014.32"},{"issue":"6","key":"7_CR16","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1007\/s10664-017-9587-0","volume":"23","author":"Z Yu","year":"2018","unstructured":"Yu, Z., Kraft, N.A., Menzies, T.: Finding better active learners for faster literature reviews. Empirical Softw. Eng. 23(6), 3161\u20133186 (2018). https:\/\/doi.org\/10.1007\/s10664-017-9587-0","journal-title":"Empirical Softw. Eng."},{"issue":"11","key":"7_CR17","first-page":"2401","volume":"47","author":"Z Yu","year":"2019","unstructured":"Yu, Z., Theisen, C., Williams, L., Menzies, T.: Improving vulnerability inspection efficiency using active learning. IEEE TSE 47(11), 2401\u20132420 (2019)","journal-title":"IEEE TSE"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"110059","DOI":"10.1109\/ACCESS.2020.3001440","volume":"8","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Wu, J., Chen, C., Zheng, Z., Lyu, M.R.: Cds: a cross-version software defect prediction model with data selection. IEEE Access 8, 110059\u2013110072 (2020)","journal-title":"IEEE Access"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lo, D., Xia, X., Xu, B., Sun, J., Li, S.: Combining software metrics and text features for vulnerable file prediction. In: 2015 20th ICECCS, pp. 40\u201349. IEEE (2015)","DOI":"10.1109\/ICECCS.2015.15"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Nagappan, N., Williams, L.: Searching for a needle in a haystack: predicting security vulnerabilities for windows vista. In: 2010 ICST, pp. 421\u2013428. IEEE (2010)","DOI":"10.1109\/ICST.2010.32"}],"container-title":["Advances in Intelligent Systems and Computing","New Trends in Disruptive Technologies, Tech Ethics and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14859-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,27]],"date-time":"2022-08-27T17:14:54Z","timestamp":1661620494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14859-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,28]]},"ISBN":["9783031148583","9783031148590"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14859-0_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022,8,28]]},"assertion":[{"value":"28 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DiTTEt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dittet2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dittet.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}