{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T18:40:29Z","timestamp":1765392029034,"version":"3.46.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Italian Piano Nazionale di Ripresa e Resilienza Ministero dell\u2019Universit\u00e0 e della Ricerca","award":["PE0000013-FAIR"],"award-info":[{"award-number":["PE0000013-FAIR"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3637505","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:05:14Z","timestamp":1764183914000},"page":"204480-204498","source":"Crossref","is-referenced-by-count":0,"title":["SecLLM: Enhancing Security Smell Detection in IaC With Large Language Models"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1153-1566","authenticated-orcid":false,"given":"Gabriele De","family":"Vito","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9337-5116","authenticated-orcid":false,"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0975-8972","authenticated-orcid":false,"given":"Filomena","family":"Ferrucci","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Salerno, Fisciano, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00092"},{"volume-title":"Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation","year":"2010","author":"Humble","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.162"},{"volume-title":"Infrastructure As Code","year":"2020","author":"Morris","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00033"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3065190"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3691630"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556945"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3408897"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3265962"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3501385.3543957"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APR59189.2023.00012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3593434.3593468"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3697010"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/3643661.3643952","article-title":"An exploratory study on how non-determinism in large language models affects log parsing","volume-title":"Proc. ACM\/IEEE 2nd Int. Workshop Interpretability, Robustness, Benchmarking Neural Softw. Eng.","author":"Astekin"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110726"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3527964"},{"volume-title":"CWE-Common Weakness Enumeration","year":"2024","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380409"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09841-8"},{"key":"ref21","article-title":"Evaluating large language models trained on code","author":"Chen","year":"2021","journal-title":"arXiv:2107.03374"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102274"},{"key":"ref23","article-title":"A survey of large language models","author":"Xin Zhao","year":"2023","journal-title":"arXiv:2303.18223"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3660790"},{"key":"ref25","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"Achiam","year":"2023"},{"volume-title":"Claude 3.5 Sonnet","year":"2024","key":"ref26"},{"key":"ref27","article-title":"LLaMA: Open and efficient foundation language models","author":"Touvron","year":"2023","journal-title":"arXiv:2302.13971"},{"key":"ref28","first-page":"189","article-title":"Does your configuration code smell?","volume-title":"Proc. IEEE\/ACM 13th Work. Conf. Mining Softw. Repositories (MSR)","author":"Sharma"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2018.00040"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00079"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560419"},{"key":"ref32","article-title":"A prompt pattern catalog to enhance prompt engineering with ChatGPT","author":"White","year":"2023","journal-title":"arXiv:2302.11382"},{"volume-title":"GovTech Data Science and Singapore Government AI Division","year":"2023","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451760"},{"volume-title":"Secllm Github Repository","year":"2025","author":"De Vito","key":"ref35"},{"key":"ref36","first-page":"46701","article-title":"CrossCodeEval: A diverse and multilingual benchmark for cross-file code completion","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ding"},{"key":"ref37","first-page":"26619","article-title":"Measuring the impact of programming language distribution","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Orlanski"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-emnlp.541"},{"key":"ref39","article-title":"Qwen2.5 technical report","volume-title":"arXiv:2412.15115","author":"Yang","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.52202\/079017-1939"},{"key":"ref41","article-title":"How LLMs learn: Tracing internal representations with sparse autoencoders","author":"Inaba","year":"2025","journal-title":"arXiv:2503.06394"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639133"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.blackboxnlp-1.4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111425"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/0471445428"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11269824.pdf?arnumber=11269824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T18:33:59Z","timestamp":1765391639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11269824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3637505","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}