{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T15:04:35Z","timestamp":1775315075782,"version":"3.50.1"},"reference-count":67,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["SJCX25_2005"],"award-info":[{"award-number":["SJCX25_2005"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011246","name":"State Key Laboratory of Novel Software Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202006"],"award-info":[{"award-number":["61202006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.jss.2026.112855","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T07:44:47Z","timestamp":1773474287000},"page":"112855","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ReVul-CoT: Towards effective software vulnerability assessment with retrieval-augmented generation and chain-of-thought prompting"],"prefix":"10.1016","volume":"237","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8483-5739","authenticated-orcid":false,"given":"Zhijie","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-3891","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6924-8510","authenticated-orcid":false,"given":"Ziming","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9358-4462","authenticated-orcid":false,"given":"Jiacheng","family":"Xue","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2627-1513","authenticated-orcid":false,"given":"Chaoyang","family":"Gao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2026.112855_bib0001","series-title":"Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing","first-page":"15020","article-title":"Hallumeasure: fine-grained hallucination measurement using chain-of-thought reasoning","author":"Akbar","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0002","series-title":"2021 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","first-page":"171","article-title":"Severity prediction of software vulnerabilities based on their text description","author":"Babalau","year":"2021"},{"issue":"6","key":"10.1016\/j.jss.2026.112855_bib0003","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0177678","article-title":"Optimal classifier for imbalanced data using matthews correlation coefficient metric","volume":"12","author":"Boughorbel","year":"2017","journal-title":"PLoS ONE"},{"key":"10.1016\/j.jss.2026.112855_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112038","article-title":"CSVD-TF: cross-project software vulnerability detection with tradaboost by fusing expert metrics and semantic metrics","volume":"213","author":"Cai","year":"2024","journal-title":"J. Syst. Software"},{"issue":"2","key":"10.1016\/j.jss.2026.112855_bib0005","doi-asserted-by":"crossref","DOI":"10.1007\/s10515-025-00543-3","article-title":"MCL-VD: multi-modal contrastive learning with lora-enhanced graphcodebert for effective vulnerability detection","volume":"32","author":"Cao","year":"2025","journal-title":"Autom. Software Eng."},{"key":"10.1016\/j.jss.2026.112855_bib0006","unstructured":"Cheng, Z., Xie, T., Shi, P., Li, C., Nadkarni, R., Hu, Y., Xiong, C., Radev, D., Ostendorf, M., Zettlemoyer, L., et al., 2022. Binding language models in symbolic languages. arXiv: 2210.02875."},{"issue":"3","key":"10.1016\/j.jss.2026.112855_bib0007","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1022627411411","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"10.1016\/j.jss.2026.112855_bib0008","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"121","article-title":"Data quality for software vulnerability datasets","author":"Croft","year":"2023"},{"key":"10.1016\/j.jss.2026.112855_bib0009","unstructured":"CVE, 2025. Common vulnerabilities and exposures. https:\/\/www.cve.org\/About\/Metrics\/."},{"key":"10.1016\/j.jss.2026.112855_bib0010","unstructured":"CVS, 2025. Common vulnerability scoring system. https:\/\/www.first.org\/cvss\/."},{"key":"10.1016\/j.jss.2026.112855_bib0011","unstructured":"CWE, 2025. Common weakness enumeration. https:\/\/cwe.mitre.org\/."},{"key":"10.1016\/j.jss.2026.112855_bib0012","unstructured":"deepseek, 2025. Deepseek. https:\/\/www.deepseek.com\/."},{"key":"10.1016\/j.jss.2026.112855_bib0013","series-title":"2024 IEEE International Conference on Software Maintenance and Evolution (ICSME)","first-page":"262","article-title":"Improving long-tail vulnerability detection through data augmentation based on large language models","author":"Deng","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0014","unstructured":"Diao, S., Wang, P., Lin, Y., Pan, R., Liu, X., Zhang, T., 2023. Active prompting with chain-of-thought for large language models. arXiv: 2302.12246."},{"key":"10.1016\/j.jss.2026.112855_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112039","article-title":"A vulnerability severity prediction method based on bimodal data and multi-task learning","volume":"213","author":"Du","year":"2024","journal-title":"J. Syst. Software"},{"key":"10.1016\/j.jss.2026.112855_bib0016","unstructured":"Du, X., Zheng, G., Wang, K., Zou, Y., Wang, Y., Deng, W., Feng, J., Liu, M., Chen, B., Peng, X., et al., 2024b. VUL-RAG: enhancing LLM-based vulnerability detection via knowledge-level RAG. arXiv: 2406.11147."},{"issue":"8","key":"10.1016\/j.jss.2026.112855_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3648610","article-title":"A survey on software vulnerability exploitability assessment","volume":"56","author":"Elder","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jss.2026.112855_bib0018","series-title":"Proceedings of the 17th International Conference on Mining Software Repositories","first-page":"508","article-title":"AC\/C++ code vulnerability dataset with code changes and CVE summaries","author":"Fan","year":"2020"},{"key":"10.1016\/j.jss.2026.112855_bib0019","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Qin, B., Liu, T., Jiang, D., et al., 2020. CodeBERT: a pre-trained model for programming and natural languages. arXiv: 2002.08155.","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"10.1016\/j.jss.2026.112855_bib0020","series-title":"2021 Swedish Workshop on Data Science (SweDS)","first-page":"1","article-title":"Predicting security vulnerabilities using source code metrics","author":"Ganesh","year":"2021"},{"key":"10.1016\/j.jss.2026.112855_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2025.107803","article-title":"SVA-ICL: improving LLM-based software vulnerability assessment via in-context learning and information fusion","author":"Gao","year":"2025","journal-title":"Inf. Software Technol."},{"issue":"5-6","key":"10.1016\/j.jss.2026.112855_bib0022","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.compbiolchem.2004.09.006","article-title":"Comparing two k-category assignments by a k-category correlation coefficient","volume":"28","author":"Gorodkin","year":"2004","journal-title":"Comput. Biol. Chem."},{"key":"10.1016\/j.jss.2026.112855_bib0023","series-title":"2017 IEEE International Conference on Software Maintenance and Evolution (ICSME)","first-page":"125","article-title":"Learning to predict severity of software vulnerability using only vulnerability description","author":"Han","year":"2017"},{"key":"10.1016\/j.jss.2026.112855_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2023.107247","article-title":"A novel vulnerability severity assessment method for source code based on a graph neural network","volume":"161","author":"Hao","year":"2023","journal-title":"Inf. Software Technol."},{"issue":"10","key":"10.1016\/j.jss.2026.112855_bib0025","doi-asserted-by":"crossref","DOI":"10.3390\/electronics14101961","article-title":"Enhancing large language models for specialized domains: a two-stage framework with parameter-sensitive LoRA fine-tuning and chain-of-thought RAG","volume":"14","author":"He","year":"2025","journal-title":"Electronics"},{"key":"10.1016\/j.jss.2026.112855_bib0026","series-title":"Proceedings of 3rd International Conference on Document Analysis and Recognition","article-title":"Proceedings of 3rd international conference on document analysis and recognition","author":"Ho","year":"1995"},{"key":"10.1016\/j.jss.2026.112855_bib0027","doi-asserted-by":"crossref","first-page":"2800","DOI":"10.1109\/TASLP.2024.3402087","article-title":"CoSENT: consistent sentence embedding via similarity ranking","volume":"32","author":"Huang","year":"2024","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"3","key":"10.1016\/j.jss.2026.112855_bib0028","doi-asserted-by":"crossref","first-page":"5039","DOI":"10.32604\/cmc.2022.019289","article-title":"Security threat and vulnerability assessment and measurement in secure software development","volume":"71","author":"Humayun","year":"2022","journal-title":"Comput. Mater. Continua"},{"key":"10.1016\/j.jss.2026.112855_bib0029","unstructured":"Jiang, C., Pan, X., Hong, G., Bao, C., Chen, Y., Yang, M., 2025. Feedback-guided extraction of knowledge base from retrieval-augmented LLM applications. arXiv: 2411.14110."},{"key":"10.1016\/j.jss.2026.112855_bib0030","first-page":"22199","article-title":"Large language models are zero-shot reasoners","volume":"35","author":"Kojima","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2026.112855_bib0031","unstructured":"Kumar, A., Kim, H., Nathani, J. S., Roy, N., 2025. Improving the reliability of LLMs: combining cot, RAG, self-consistency, and self-verification. arXiv: 2505.09031."},{"key":"10.1016\/j.jss.2026.112855_bib0032","series-title":"Proceedings of the 19th International Conference on Mining Software Repositories","first-page":"621","article-title":"On the use of fine-grained vulnerable code statements for software vulnerability assessment models","author":"Le","year":"2022"},{"issue":"5","key":"10.1016\/j.jss.2026.112855_bib0033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3529757","article-title":"A survey on data-driven software vulnerability assessment and prioritization","volume":"55","author":"Le","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jss.2026.112855_bib0034","series-title":"2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"717","article-title":"DeepCVA: automated commit-level vulnerability assessment with deep multi-task learning","author":"Le","year":"2021"},{"key":"10.1016\/j.jss.2026.112855_bib0035","series-title":"2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)","first-page":"371","article-title":"Automated software vulnerability assessment with concept drift","author":"Le","year":"2019"},{"key":"10.1016\/j.jss.2026.112855_bib0036","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2026.112855_bib0037","series-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","first-page":"3149","article-title":"LightGBM: a highly efficient gradient boosting decision tree","author":"Ke","year":"2017"},{"key":"10.1016\/j.jss.2026.112855_bib0038","doi-asserted-by":"crossref","first-page":"21558","DOI":"10.52202\/075280-0943","article-title":"Is your code generated by ChatGPT really correct? Rigorous evaluation of large language models for code generation","volume":"36","author":"Liu","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"9","key":"10.1016\/j.jss.2026.112855_bib0039","doi-asserted-by":"crossref","first-page":"4390","DOI":"10.1109\/TSE.2023.3292399","article-title":"Automated question title reformulation by mining modification logs from stack overflow","volume":"49","author":"Liu","year":"2023","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jss.2026.112855_bib0040","series-title":"2019 5th International Conference on Big Data and Information Analytics (BigDIA)","first-page":"114","article-title":"Vulnerability severity prediction with deep neural network","author":"Liu","year":"2019"},{"key":"10.1016\/j.jss.2026.112855_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112031","article-title":"Grace: empowering LLM-based software vulnerability detection with graph structure and in-context learning","volume":"212","author":"Lu","year":"2024","journal-title":"J. Syst. Software"},{"key":"10.1016\/j.jss.2026.112855_bib0042","unstructured":"Ming, X., 2022. Similarities: similarity calculation and semantic search toolkit. https:\/\/github.com\/shibing624\/similarities."},{"key":"10.1016\/j.jss.2026.112855_bib0043","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE)","first-page":"2450","article-title":"Retrieval-based prompt selection for code-related few-shot learning","author":"Nashid","year":"2023"},{"key":"10.1016\/j.jss.2026.112855_bib0044","series-title":"Proceedings of the 21st International Conference on Mining Software Repositories","first-page":"738","article-title":"MegaVul: AC\/C++ vulnerability dataset with comprehensive code representations","author":"Ni","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0045","unstructured":"Nong, Y., Aldeen, M., Cheng, L., Hu, H., Chen, F., Cai, H., 2024. Chain-of-thought prompting of large language models for discovering and fixing software vulnerabilities. arXiv: 2402.17230."},{"issue":"4","key":"10.1016\/j.jss.2026.112855_bib0046","doi-asserted-by":"crossref","DOI":"10.3390\/s23041802","article-title":"Support for the vulnerability management process using conversion CVSS base score 2.0 to 3. x","volume":"23","author":"Nowak","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.jss.2026.112855_bib0047","unstructured":"NVD, 2024. National vulnerability database. https:\/\/nvd.nist.gov\/."},{"key":"10.1016\/j.jss.2026.112855_bib0048","series-title":"2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"112","article-title":"Software vulnerability detection using large language models","author":"Purba","year":"2023"},{"key":"10.1016\/j.jss.2026.112855_bib0049","first-page":"1316","article-title":"In-context retrieval-augmented language models","volume":"11","author":"Ram","year":"2023","journal-title":"Trans. Assoc. Comput. Ling."},{"key":"10.1016\/j.jss.2026.112855_bib0050","series-title":"Artificial Intelligence: A Modern Approach","author":"Russell","year":"2016"},{"key":"10.1016\/j.jss.2026.112855_bib0051","unstructured":"Software Assurance Reference Dataset (SARD). Accessed: Dec. 30, 2024. [Online]. Available: https:\/\/samate.nist.gov\/SARD."},{"key":"10.1016\/j.jss.2026.112855_bib0052","series-title":"2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA)","first-page":"1600","article-title":"CVSS-BERT: explainable natural language processing to determine the severity of a computer security vulnerability from its description","author":"Shahid","year":"2021"},{"issue":"5","key":"10.1016\/j.jss.2026.112855_bib0053","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3769082","article-title":"LLMs in software security: a survey of vulnerability detection techniques and insights","volume":"58","author":"Sheng","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.jss.2026.112855_bib0054","unstructured":"Shi, W., Min, S., Yasunaga, M., Seo, M., James, R., Lewis, M., Zettlemoyer, L., Yih, W.-t., 2023. REPLUG: retrieval-augmented black-box language models. arXiv: 2301.12652."},{"key":"10.1016\/j.jss.2026.112855_bib0055","series-title":"2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","first-page":"216","article-title":"Software vulnerability detection using LLM: does additional information help?","author":"Shimmi","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0056","unstructured":"Siddiq, M. L., Sekerak, N., Karam, A., Leal, M., Islam-Gomes, A., Santos, J., 2025. Assessing the software security comprehension of large language models. arXiv: 2512.21238."},{"key":"10.1016\/j.jss.2026.112855_bib0057","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jss.2018.09.039","article-title":"A multi-target approach to estimate software vulnerability characteristics and severity scores","volume":"146","author":"Spanos","year":"2018","journal-title":"J. Syst. Software"},{"key":"10.1016\/j.jss.2026.112855_bib0058","series-title":"2024 IEEE Symposium on Security and Privacy (SP)","first-page":"862","article-title":"LLMs cannot reliably identify and reason about security vulnerabilities (Yet?): a comprehensive evaluation, framework, and benchmarks","author":"Ullah","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0059","series-title":"Chi Conference on Human Factors in Computing Systems Extended Abstracts","first-page":"1","article-title":"Expectation vs. experience: evaluating the usability of code generation tools powered by large language models","author":"Vaithilingam","year":"2022"},{"issue":"1-2","key":"10.1016\/j.jss.2026.112855_bib0060","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1093\/biomet\/54.1-2.167","article-title":"Estimation of the probability of an event as a function of several independent variables","volume":"54","author":"Walker","year":"1967","journal-title":"Biometrika"},{"issue":"2","key":"10.1016\/j.jss.2026.112855_bib0061","doi-asserted-by":"crossref","DOI":"10.1007\/s10515-025-00507-7","article-title":"Sift: enhance the performance of vulnerability detection by incorporating structural knowledge and multi-task learning","volume":"32","author":"Wang","year":"2025","journal-title":"Autom. Software Eng."},{"key":"10.1016\/j.jss.2026.112855_bib0062","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S., Hoi, S. C. H., 2021. Codet5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv: 2109.00859.","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"10.1016\/j.jss.2026.112855_bib0063","first-page":"24824","article-title":"Chain-of-thought prompting elicits reasoning in large language models","volume":"35","author":"Wei","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2026.112855_bib0064","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104184","article-title":"Towards prompt tuning-based software vulnerability assessment with continual learning","volume":"150","author":"Xue","year":"2025","journal-title":"Comput. Secur."},{"key":"10.1016\/j.jss.2026.112855_bib0065","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2024.107405","article-title":"Automatic smart contract comment generation via large language models and in-context learning","volume":"168","author":"Zhao","year":"2024","journal-title":"Inf. Software Technol."},{"key":"10.1016\/j.jss.2026.112855_bib0066","series-title":"Proceedings of the 2024 ACM\/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results","first-page":"47","article-title":"Large language model for vulnerability detection: emerging results and future directions","author":"Zhou","year":"2024"},{"key":"10.1016\/j.jss.2026.112855_bib0067","first-page":"10197","article-title":"Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume":"32","author":"Zhou","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000890?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000890?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:06:41Z","timestamp":1775311601000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121226000890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":67,"alternative-id":["S0164121226000890"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2026.112855","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ReVul-CoT: Towards effective software vulnerability assessment with retrieval-augmented generation and chain-of-thought prompting","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2026.112855","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112855"}}