{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:48:57Z","timestamp":1757314137829,"version":"3.37.3"},"reference-count":145,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100000001","name":"USA National Science Foundation","doi-asserted-by":"publisher","award":["1757828","1822137"],"award-info":[{"award-number":["1757828","1822137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3128438","type":"journal-article","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T20:31:06Z","timestamp":1637094666000},"page":"155314-155334","source":"Crossref","is-referenced-by-count":5,"title":["Software Fault-Proneness Analysis based on Composite Developer-Module Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2770-0106","authenticated-orcid":false,"given":"Shou-Yu","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1021-4753","authenticated-orcid":false,"given":"W. Eric","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Yihao","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-3486","authenticated-orcid":false,"given":"William Cheng-Chung","family":"Chu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.05.035"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79187-4_22"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606748"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00086-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/581368.581371"},{"journal-title":"GNOME Gedit","year":"2021","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i4.1041"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.46"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.20"},{"journal-title":"Controlling Software Projects Management Measurement & Estimation","year":"1986","author":"demarco","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568824"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.32"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.42"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1996.492450"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.19"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"journal-title":"Software Engineering Metrics and Models","year":"1986","author":"conte","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009736205722"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/52.476287"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSR.2016.016"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414038"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.29"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.89"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00126-7"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138012"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/24.537016"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IC3INA.2013.6819188"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159738"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011323"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.235431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.1999.776386"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2007.4371415"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.17"},{"key":"ref46","first-page":"625","article-title":"The impact of software process consistency on residual defects","volume":"27","author":"huang","year":"2015","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.03.004"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370793"},{"key":"ref47","first-page":"1","article-title":"Review of software psychology","volume":"40","author":"huang","year":"2013","journal-title":"Comput Sci"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34226-5_32"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref44","first-page":"44","article-title":"A taxonomy system to identify human error causes for software defects","author":"huang","year":"2012","journal-title":"Proc 18th Int Conf Rel Quality Design"},{"article-title":"Software fault defense based on human errors","year":"2013","author":"huang","key":"ref43"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9082-8"},{"journal-title":"The Psychology of Computer Programming","year":"1971","author":"weinberg","key":"ref126"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.72.026107"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2002-00248-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985832"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1809223.1809234"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070503"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9111-2"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868356"},{"key":"ref76","first-page":"51","article-title":"Metrics that matter","author":"menzies","year":"2002","journal-title":"Proceedings 26th Annual NASA Goddard Software Engineering Workshop"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100065"},{"key":"ref77","first-page":"1","article-title":"An approach to quantifying the runtime behaviour of Java GUI applications","author":"mitchell","year":"2004","journal-title":"Proc Winter Int Symp Inf Commun Technol"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453106"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(20001125)30:14<1587::AID-SPE352>3.0.CO;2-1"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.06.069"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.38"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22714-1_7"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730891"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882311"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22418-8_25"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1067014"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.6"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.14"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2015.27"},{"key":"ref139","first-page":"198","article-title":"A topological analysis of the open source software development community","author":"xu","year":"2005","journal-title":"Proc 38th Annu Hawaii Int Conf Syst Sci"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/0141-9331(87)90524-2"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/TSE.1987.233475","article-title":"an empirical study of software metrics","volume":"se 13","author":"li","year":"1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90077-B"},{"key":"ref140","first-page":"99","article-title":"Predicting fault-proneness using OO metrics. An industrial case study","author":"yu","year":"2002","journal-title":"Proc European Conf Software Maintenance and Reeng"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916615"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.32"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SATE.2016.9"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIE.2010.5559743"},{"key":"ref67","first-page":"361","article-title":"Network motif and triad significance profile research on software system","volume":"30","author":"lin","year":"2010","journal-title":"Systems Engineering - Theory &amp; Practice"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.102"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.1"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.704"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1994.341361"},{"key":"ref69","first-page":"166","article-title":"Network motifs in object-oriented software systems","volume":"14","author":"ma","year":"2007","journal-title":"Dyn Continuous Discrete Impuls Syst Ser B Appl Algorithms"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2003.1251044"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.12.794"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868357"},{"journal-title":"Scitools' understand","year":"2021","key":"ref108"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070505"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624041"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000042059.16470.f0"},{"journal-title":"Redis","year":"2021","key":"ref105"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/32.553637"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CONSEG.2012.6349484"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083163"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref111","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538424.001.0001","author":"shepperd","year":"1993","journal-title":"Derivation and Validation of Software Metrics"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1038\/ng881"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.30"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1012"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70722"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9178-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9205-0"},{"key":"ref14","first-page":"119","article-title":"Enhancing RBF-DDA algorithm&#x2019;s robustness: Neural networks applied to prediction of fault-prone software modules","author":"bezerra","year":"2008","journal-title":"Proc 20th IFIP World Comput Congr"},{"key":"ref15","first-page":"63","article-title":"Defect prediction using social network analysis on issue repositories","author":"bi\u00e7er","year":"2011","journal-title":"Proc 2nd Workshop Softw Eng Sensor Netw Appl (SESENA)"},{"key":"ref118","first-page":"1","article-title":"A taxonomy of dependencies in agile software development","author":"strode","year":"2012","journal-title":"Proc 23rd Australas Conf Inf Projects"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491440"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.046116"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"journal-title":"Elementary Statistics - A Step by Step Approach","year":"2007","author":"bluman","key":"ref17"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738486"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00102-8"},{"journal-title":"Nagios Core","year":"2021","key":"ref84"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(97)00060-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.022"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2020976.2020994"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606747"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-009-9079-6"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2108144.2108157"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.05.001"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463285"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9053-3"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540446"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.61.1088"},{"journal-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","year":"2002","key":"ref85"},{"journal-title":"Nginx","year":"2021","key":"ref86"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609560"},{"key":"ref88","first-page":"1","article-title":"A SLOC counting standard","author":"nguyen","year":"2007","journal-title":"Proc 22nd Int Forum COCOMO Syst \/Softw Cost Modeling"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/9312710\/9615229-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09615229.pdf?arnumber=9615229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T18:53:57Z","timestamp":1699815237000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":145,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3128438","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}