{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:48:44Z","timestamp":1756000124450,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icdim.2018.8847079","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T21:38:32Z","timestamp":1569533912000},"page":"156-161","source":"Crossref","is-referenced-by-count":8,"title":["Machine Learning based Static Code Analysis for Software Quality Assurance"],"prefix":"10.1109","author":[{"given":"Eldar","family":"Sultanow","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andre","family":"Ullrich","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Konopik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gergana","family":"Vladova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","volume":"521","author":"fejzer","year":"0","journal-title":"BDAS 2015 Communications in Computer and Information Science"},{"journal-title":"Source Code Security Analyzers","year":"2016","author":"samate","key":"ref11"},{"journal-title":"CCLearner &#x2013; A deep learning-based clone detection approach","year":"2017","author":"li","key":"ref12"},{"key":"ref13","article-title":"Automated Analysis of Source Code Patches using Machine Learning Algorithms","author":"lechtaler","year":"0","journal-title":"IV Workshop de Seguridad Inform&#x00E1;tica (WSI) 2015 XXI Congreso Argentino de Ciencias de la Computaci&#x00F3;n"},{"key":"ref14","article-title":"Learning natural coding conventions","author":"allamanis","year":"2016","journal-title":"Dissertation"},{"key":"ref15","first-page":"2091","article-title":"A convolutional attention network for extreme summarization of source code","volume":"48","author":"allamanis","year":"2016","journal-title":"Machine Learning Research"},{"journal-title":"Machine Learning for the analysis of source code text","article-title":"MAST","year":"2018","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939696"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"journal-title":"Understanding Machine Learning From Theory to Algorithms","year":"2014","author":"shai","key":"ref19"},{"key":"ref4","article-title":"Static Analysis, Dynamic Analysis and how to use them together","author":"cornell","year":"2018","journal-title":"Denim Group"},{"journal-title":"Systems and methods for combining static and dynamic code analysis","year":"2014","author":"mccorkendale","key":"ref3"},{"key":"ref6","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73101-6_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/09332480.2014.914768"},{"journal-title":"Static Testing vs Dynamic Testing","year":"2017","author":"dupaul","key":"ref2"},{"journal-title":"Why SonarQube An introduction to Static Code Analysis","year":"2015","author":"nadeem","key":"ref1"},{"key":"ref9","article-title":"Detecting defects with an interactive code review tool based on visualisation and Machine Learning","author":"axelsson","year":"2009","journal-title":"Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/11004011_5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07821-2"}],"event":{"name":"2018 Thirteenth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2018,9,24]]},"location":"Berlin, Germany","end":{"date-parts":[[2018,9,26]]}},"container-title":["2018 Thirteenth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8843511\/8846966\/08847079.pdf?arnumber=8847079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T01:58:29Z","timestamp":1569981509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8847079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icdim.2018.8847079","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}