{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:36:10Z","timestamp":1769733370910,"version":"3.49.0"},"reference-count":53,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1016\/j.jss.2007.07.040","type":"journal-article","created":{"date-parts":[[2007,10,6]],"date-time":"2007-10-06T11:18:16Z","timestamp":1191669496000},"page":"649-660","source":"Crossref","is-referenced-by-count":404,"title":["Predicting defect-prone software modules using support vector machines"],"prefix":"10.1016","volume":"81","author":[{"given":"Karim O.","family":"Elish","sequence":"first","affiliation":[]},{"given":"Mahmoud O.","family":"Elish","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2007.07.040_bib1","series-title":"Support Vector Machines for Pattern Classification","author":"Abe","year":"2005"},{"key":"10.1016\/j.jss.2007.07.040_bib2","doi-asserted-by":"crossref","unstructured":"Azar, D., Bouktif, S., K\u2019egl, B., Sahraoui, H., Precup, D., 2002. Combining and adapting software quality predictive models by genetic algorithms. In: Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE2002), pp. 285\u2013288.","DOI":"10.1109\/ASE.2002.1115031"},{"key":"10.1016\/j.jss.2007.07.040_bib3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0014-5793(02)02835-1","article-title":"Identifying genes related to drug anticancer mechanisms using support vector machine","volume":"521","author":"Bao","year":"2002","journal-title":"FEBS Letters"},{"issue":"6","key":"10.1016\/j.jss.2007.07.040_bib4","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/32.6156","article-title":"The TAME project: towards improvement-oriented software environment","volume":"14","author":"Basili","year":"1988","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"10.1016\/j.jss.2007.07.040_bib5","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/32.544352","article-title":"A validation of object-oriented design metrics as quality indicators","volume":"22","author":"Basili","year":"1996","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine Learning"},{"issue":"11","key":"10.1016\/j.jss.2007.07.040_bib7","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1109\/32.256851","article-title":"Developing interpretable models with optimized set reduction for identifying high-risk software components","volume":"19","author":"Briand","year":"1993","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib8","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S0097-8485(01)00094-8","article-title":"Drug design by machine learning: support vector machines for pharmaceutical data analysis","volume":"26","author":"Burbidge","year":"2001","journal-title":"Computers and Chemistry"},{"key":"10.1016\/j.jss.2007.07.040_bib9","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","article-title":"A tutorial on support vector machines for pattern recognition","volume":"2","author":"Burges","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.1016\/j.jss.2007.07.040_bib10","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S0097-8485(01)00113-9","article-title":"Prediction of protein structural classes by support vector machines","volume":"26","author":"Cai","year":"2002","journal-title":"Computers and Chemistry"},{"key":"10.1016\/j.jss.2007.07.040_bib11","doi-asserted-by":"crossref","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","article-title":"Application of SVM and ANN for intrusion detection","volume":"32","author":"Chen","year":"2005","journal-title":"Computers and Operations Research"},{"issue":"6","key":"10.1016\/j.jss.2007.07.040_bib12","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","article-title":"A metrics suite for object-oriented design","volume":"20","author":"Chidamber","year":"1994","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Machine Learning"},{"key":"10.1016\/j.jss.2007.07.040_bib14","series-title":"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods","author":"Cristianini","year":"2000"},{"key":"10.1016\/j.jss.2007.07.040_bib15","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1162\/089976698300017197","article-title":"Approximate statistical tests for comparing supervised classification learning algorithms","volume":"10","author":"Dietterich","year":"1998","journal-title":"Neural Computation"},{"issue":"5","key":"10.1016\/j.jss.2007.07.040_bib16","doi-asserted-by":"crossref","first-page":"1048","DOI":"10.1109\/72.788645","article-title":"Support vector machines for spam categorization","volume":"10","author":"Drucker","year":"1999","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.jss.2007.07.040_bib17","series-title":"Pattern Classification","author":"Duda","year":"2001"},{"issue":"4","key":"10.1016\/j.jss.2007.07.040_bib18","first-page":"21","article-title":"Using SVMS for text categorization","volume":"13","author":"Dumais","year":"1998","journal-title":"IEEE Intelligent Systems"},{"issue":"3","key":"10.1016\/j.jss.2007.07.040_bib19","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/S0164-1212(00)00079-0","article-title":"Comparing case-based reasoning classifiers for predicting high risk software components","volume":"55","author":"Emam","year":"2001","journal-title":"Journal of Systems and Software"},{"issue":"8","key":"10.1016\/j.jss.2007.07.040_bib20","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/32.879815","article-title":"Quantitative analysis of faults and failures in a complex software system","volume":"26","author":"Fenton","year":"2000","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib21","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MS.2002.1020298","article-title":"Software measurement: uncertainty and causal modeling","volume":"19","author":"Fenton","year":"2002","journal-title":"IEEE Software"},{"key":"10.1016\/j.jss.2007.07.040_bib22","unstructured":"Gun, S., 1998. Support vector machines for classification and regression. Technical Report, University of Southampton."},{"key":"10.1016\/j.jss.2007.07.040_bib23","doi-asserted-by":"crossref","unstructured":"Guo, L., Cukic, B., Singh, H., 2003. Predicting fault prone modules by the Dempster\u2013Shafer belief networks. In: Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), pp. 249\u2013252.","DOI":"10.1109\/ASE.2003.1240314"},{"key":"10.1016\/j.jss.2007.07.040_bib24","unstructured":"Guo, L., Ma, Y., Cukic, B., Singh, H., 2004. Robust prediction of fault-proneness by random forests. In: Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE\u201904), pp. 417\u2013428."},{"key":"10.1016\/j.jss.2007.07.040_bib25","unstructured":"Hall, M., 2000. Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of the 17th International Conference on Machine Learning, pp. 359\u2013366."},{"key":"10.1016\/j.jss.2007.07.040_bib26","series-title":"Elements of Software Science","author":"Halstead","year":"1977"},{"key":"10.1016\/j.jss.2007.07.040_bib27","series-title":"Data Mining: Concepts and Techniques","author":"Han","year":"2001"},{"key":"10.1016\/j.jss.2007.07.040_bib28","series-title":"Applied Logistic Regression","author":"Hosmer","year":"2000"},{"issue":"1","key":"10.1016\/j.jss.2007.07.040_bib29","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/52.476287","article-title":"Early quality prediction: a case study in telecommunications","volume":"13","author":"Khoshgoftaar","year":"1996","journal-title":"IEEE Software"},{"issue":"4","key":"10.1016\/j.jss.2007.07.040_bib30","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/72.595888","article-title":"Application of neural networks to software quality modeling of a very large telecommunications system","volume":"8","author":"Khoshgoftaar","year":"1997","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"4","key":"10.1016\/j.jss.2007.07.040_bib31","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/TR.2002.804488","article-title":"Using regression trees to classify fault-prone software modules","volume":"51","author":"Khoshgoftaar","year":"2002","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/j.jss.2007.07.040_bib32","unstructured":"Kohavi, R., 1995. A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI), pp. 1137\u20131143."},{"key":"10.1016\/j.jss.2007.07.040_bib33","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MS.2005.149","article-title":"Building effective defect-prediction models in practice","author":"Koru","year":"2005","journal-title":"IEEE Software"},{"key":"10.1016\/j.jss.2007.07.040_bib34","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/S0164-1212(02)00126-7","article-title":"An empirical comparison and characterization of high defect and high complexity modules","volume":"67","author":"Koru","year":"2003","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/j.jss.2007.07.040_bib35","doi-asserted-by":"crossref","unstructured":"Lin, S., Patel, S., Duncan, A., Goodwin, L., 2003. Using decision trees and support vector machines to classify genes by names. In: Proceedings of the European Workshop on Data Mining and Text Mining for Bioinformatics, pp. 35\u201341.","DOI":"10.1007\/978-1-4615-0907-3_3"},{"key":"10.1016\/j.jss.2007.07.040_bib36","series-title":"A Statistical Framework for the Prediction of Fault-Proneness","author":"Ma","year":"2006"},{"issue":"1","key":"10.1016\/j.jss.2007.07.040_bib37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0164-1212(00)00005-4","article-title":"An investigation of machine learning based prediction systems","volume":"53","author":"Mair","year":"2000","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"10.1016\/j.jss.2007.07.040_bib38","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","article-title":"A complexity measure","volume":"2","author":"McCabe","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"10.1016\/j.jss.2007.07.040_bib39","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1145\/76380.76382","article-title":"Design complexity measurement and testing","volume":"32","author":"McCabe","year":"1989","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jss.2007.07.040_bib40","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0304-3800(01)00296-4","article-title":"Support vector machines for identifying organisms-a comparison with strongly partitioned radial basis function networks","volume":"146","author":"Morris","year":"2001","journal-title":"Ecological Modeling"},{"issue":"5","key":"10.1016\/j.jss.2007.07.040_bib41","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/32.135775","article-title":"The detection of fault-prone programs","volume":"18","author":"Munson","year":"1992","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib42","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1023\/A:1024068626366","article-title":"Inference for the generalization error","volume":"52","author":"Nadeau","year":"2003","journal-title":"Machine Learning"},{"key":"10.1016\/j.jss.2007.07.040_bib43","unstructured":"Osuna, E., Freund, R., Girosi, F., 1997. Training support vector machines: an application to face detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 130\u2013136."},{"key":"10.1016\/j.jss.2007.07.040_bib44","doi-asserted-by":"crossref","unstructured":"Schmidt, M., Gish, H., 1996. Speaker identification via support vector classifiers. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP-96), pp. 105\u2013108.","DOI":"10.1109\/ICASSP.1996.540301"},{"issue":"5","key":"10.1016\/j.jss.2007.07.040_bib45","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/32.135774","article-title":"Methodology for validating software metrics","volume":"18","author":"Schneidewind","year":"1992","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"10.1016\/j.jss.2007.07.040_bib46","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/32.9061","article-title":"Learning from examples: generation and evaluation of decision trees for software resource analysis","volume":"14","author":"Selby","year":"1988","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"11","key":"10.1016\/j.jss.2007.07.040_bib47","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1109\/32.965341","article-title":"Comparing software prediction techniques using simulation","volume":"27","author":"Shepperd","year":"2001","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2007.07.040_bib48","unstructured":"Smola, A., 1998. Learning with kernels. Ph.D. dissertation, Department of Computer Science, Technical University Berlin, Germany."},{"key":"10.1016\/j.jss.2007.07.040_bib49","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/S0305-0483(01)00026-3","article-title":"Application of support vector machines in financial time series forecasting","volume":"29","author":"Tay","year":"2001","journal-title":"Omega"},{"key":"10.1016\/j.jss.2007.07.040_bib50","series-title":"The Nature of Statistical Learning Theory","author":"Vapnik","year":"1995"},{"key":"10.1016\/j.jss.2007.07.040_bib51","unstructured":"Weaver, R., 2003. The safety of software \u2013 Constructing and assuring arguments. Ph.D. dissertation, Department of Computer Science, University of York."},{"key":"10.1016\/j.jss.2007.07.040_bib52","series-title":"Statistical Pattern Recognition","author":"Webb","year":"2002"},{"key":"10.1016\/j.jss.2007.07.040_bib53","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2005"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412120700235X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412120700235X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T12:31:35Z","timestamp":1737462695000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016412120700235X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2008,5]]}},"alternative-id":["S016412120700235X"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2007.07.040","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2008,5]]}}}