{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:20:18Z","timestamp":1778170818115,"version":"3.51.4"},"reference-count":187,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100009388","name":"Deanship of Graduate Studies and Scientific Research, Jazan University, Saudi Arabia","doi-asserted-by":"publisher","award":["GSSRD-24"],"award-info":[{"award-number":["GSSRD-24"]}],"id":[{"id":"10.13039\/100009388","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2024.3517419","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T19:32:08Z","timestamp":1735846328000},"page":"866-903","source":"Crossref","is-referenced-by-count":12,"title":["Comprehensive Bibliographic Survey and Forward-Looking Recommendations for Software Defect Prediction: Datasets, Validation Methodologies, Prediction Approaches, and Tools"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5055-5969","authenticated-orcid":false,"given":"Mohd","family":"Mustaqeem","sequence":"first","affiliation":[{"name":"Department of Computer Science, Aligarh Muslim University, Aligarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0668-9796","authenticated-orcid":false,"given":"Mahfooz","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aligarh Muslim University, Aligarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9969-6110","authenticated-orcid":false,"given":"Suhel","family":"Mustajab","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aligarh Muslim University, Aligarh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5982-5937","authenticated-orcid":false,"given":"Faisal","family":"Alshanketi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0504-4515","authenticated-orcid":false,"given":"Shadab","family":"Alam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6657-2587","authenticated-orcid":false,"given":"Mohammed","family":"Shuaib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Software Quality in Report","year":"2021"},{"key":"ref2","volume-title":"Tricentis Software Fail Watch Finds 3.6 Billion People Affected and $1.7 Trillion Revenue Lost By Software Failures Last Year","year":"2018"},{"key":"ref3","volume-title":"Cambridge University Study States Software Bugs Cost the Economy $312 Billion Per Year","author":"Brady","year":"2013"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9563-5"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/s11227-018-2326-5","volume-title":"A Dimensionality Reduction-Based Efficient Software Fault Prediction Using Fisher Linear Discriminant Analysis","author":"Kalsoom","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.005"},{"key":"ref8","first-page":"1","article-title":"Software fault proneness prediction using support vector machines","volume-title":"Proc. World Congr. Eng.","volume":"1","author":"Singh"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-016-0489-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1730-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7917934"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.39"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55035-5_15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2019-0051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-020-00377-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01099-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.07.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1235-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2653-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052149"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.03.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BDAI.2018.8546671"},{"issue":"1","key":"ref23","first-page":"1","article-title":"A systematic literature review of software defect prediction: Research trends, datasets, methods, and frameworks","volume":"1","author":"Wahono","year":"2015","journal-title":"J. Softw. Eng."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2593833.2593842"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.10.002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114595"},{"key":"ref29","volume-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","author":"Kitchenham","year":"2007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256943"},{"issue":"4","key":"ref32","doi-asserted-by":"crossref","first-page":"7346","DOI":"10.1016\/j.eswa.2008.10.027","article-title":"Expert systems with applications","volume":"36","author":"Catal","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.9.5.1324-1333"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8858010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5069-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380360"},{"key":"ref37","first-page":"554","article-title":"An investigation of cross-project learning in online just-in-time software defect prediction","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Tabassum"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868350"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2015.8.3.15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5439"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945858"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.19.08.p17.21732181"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2020.05.03"},{"issue":"12","key":"ref47","first-page":"3525","article-title":"Mining historical software testing outcomes to predict future results","volume":"8","author":"Abdulshaheed","year":"2019","journal-title":"Compusoft"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104216"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.06.021"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.engappai.2017.12.011","article-title":"Engineering applications of artificial intelligence an artificial intelligence paradigm for troubleshooting software bugs","volume":"69","author":"Elmishali","year":"2018","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.10.009"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jallcom.2017.10.201"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316002"},{"issue":"3","key":"ref58","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.jss.2016.06.006","article-title":"The journal of systems and software a novel kernel to predict software defectiveness","volume":"119","author":"Okutan","year":"2016","journal-title":"J. Syst. Softw."},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDP7204"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8852705"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622009003715"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2013-0030"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2785445"},{"issue":"3","key":"ref64","first-page":"1","article-title":"Two stage model to detect and rank software defects on imbalanced and scarcity data sets","volume":"43","author":"Choeikiwong","year":"2016","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6688075"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2794977"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.005"},{"issue":"1","key":"ref68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJDATS.2017.10003991","article-title":"Software fault proneness prediction: A comparative study between bagging, boosting, and stacking ensemble and base learner methods","volume":"9","author":"Box","year":"2017","journal-title":"Int. J. Data Anal. Techn. Strategies"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00017"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/msr.2019.00016"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6230953"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2009.10.001"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539315500102"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340450"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817572"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194015400318"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2009.18"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2316951"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-014-0610-5"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.004"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180197"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.012"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2959-y"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.010"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.15676\/ijeei.2018.10.3.3"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5120\/12200-8368"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1515\/fcds-2018-0002"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.09.136"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.09.034"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.14257\/ijseia.2013.7.5.16"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2013.6561670"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.61"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.5120\/12721-9556"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-014-1032-2"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.04.045"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.041"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.04.009"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25964-2_3"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2972958.2972964"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2016.076145"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1142\/9789814740104_0064"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/UPCON.2016.7894693"},{"key":"ref104","first-page":"1","article-title":"PT U.S. CR","volume":"2","author":"Moussa","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1504\/IJICA.2017.088162"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54325-3_11"},{"issue":"12","key":"ref107","first-page":"1","article-title":"Optimized support vector machine for software defect prediction","volume":"13","author":"Thangavel","year":"2017","journal-title":"Int. J. Eng. Res. Dev."},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2456-8"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.06.004"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CSITSS.2017.8447615"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2018.10014002"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2018.04.07"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSM.2018.096327"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02386-9"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEI.2018.091870"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1696-z"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i1.1.9954"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.12.033"},{"key":"ref119","volume-title":"Optimization to Imbalanced Data","author":"Brezonik","year":"2019"},{"issue":"1","key":"ref120","first-page":"1","article-title":"Wrapper feature selection based heterogeneous classifiers for software defect","volume":"2","author":"Mabayoje","year":"2019","journal-title":"Adeleke Univ. J. Eng. Technol."},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICASERT.2019.8934642"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2019.12.01"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0244-7"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5478"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964321"},{"issue":"1","key":"ref126","first-page":"23","article-title":"Software defect prediction using metaheuristic algorithms and classification techniques","volume":"3","author":"Raheem","year":"2020","journal-title":"Ilorin J. Comput. Sci. Inf. Technol."},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMCIS51567.2020.9354282"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-019-00934-2"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3416506.3423577"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51965-0_43"},{"key":"ref131","first-page":"1","article-title":"Bio-inspired computing: Theories and applications","volume-title":"Proc. 14th Int. Conf.","author":"Yin"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2784"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.01.015"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111026"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.05.008"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.3390\/app11052002"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114637"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4997459"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00676-y"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2022.020362"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10044-w"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3152"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104773"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108511"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2117339"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116217"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144598"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3529093"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030514"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121084"},{"key":"ref151","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2022.111537","article-title":"The journal of systems & software on the use of deep learning in software defect prediction","volume":"195","author":"Giray","year":"2023","journal-title":"J. Syst. Softw."},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-022-01831-x"},{"issue":"1","key":"ref153","first-page":"12","article-title":"Software quality assurance models and application to defect prediction techniques","volume":"11","author":"Mona","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref154","first-page":"1","article-title":"An empirical study on the stability of explainable software defect prediction","volume":"2","author":"Shina","year":"2022","journal-title":"J. Syst. Softw."},{"issue":"1","key":"ref155","first-page":"1","article-title":"Software reliability prediction and optimization using machine learning algorithms: A review","volume":"11","author":"Yadav","year":"2023","journal-title":"J. Integr. Sci. Technol."},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3144348"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.1599417"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.04.008"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5485608"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2785445"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/32.950319"},{"key":"ref163","volume-title":"Simulated Annealing Neural Network for Software Failure Prediction","author":"Benaddy","year":"2014"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2000.895473"},{"key":"ref165","first-page":"124","article-title":"Feature selection using decision tree induction in class level metrics dataset for software defect predictions","volume":"2186","author":"Gayatri","year":"2010","journal-title":"Lect. Notes Eng. Comput. Sci."},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.10.024"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337592"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.026"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0132"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3273934.3273936"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2016.21"},{"key":"ref173","first-page":"446","article-title":"Software fault prediction: A systematic mapping study","volume-title":"Proc. ClbSE","author":"Morera"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2015.7256961"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0483-9"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.37190\/e-Inf220105"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.32"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-022-09864-y"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC60848.2023.00024"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00056"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03282-8"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"issue":"38","key":"ref184","first-page":"108","article-title":"Predicting software analysis process risks using linear stepwise discriminant analysis: Statistical methods","volume":"38","author":"Elzamly","year":"2015","journal-title":"Int. J. Adv. Inf. Sci. Technol."},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/76380.76382"},{"key":"ref186","volume-title":"Elements of Software Science","author":"Halstead","year":"1977"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10798423.pdf?arnumber=10798423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T05:24:55Z","timestamp":1735881895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10798423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":187,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3517419","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}