{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:39:07Z","timestamp":1742805547713,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/isdfs52919.2021.9486319","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:37:12Z","timestamp":1626813432000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Software Engineering for Data Mining (ML-Enabled) Software Applications"],"prefix":"10.1109","author":[{"given":"Sabeer","family":"Saeed","sequence":"first","affiliation":[{"name":"Firat University,Department of Software Engineering,Elazig,Turkey"}]},{"given":"Mohammed Mansur","family":"Abubakar","sequence":"additional","affiliation":[{"name":"Firat University,Department of Computer Engineering,Elazig,Turkey"}]},{"given":"Murat","family":"Karabatak","sequence":"additional","affiliation":[{"name":"Firat University,Department of Software Engineering,Elazig,Turkey"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.3571224"},{"journal-title":"Software Engineering for Machine Learning Characterizing and detecting mismatch and predicting inference degradation in machine learning system","year":"2021","key":"ref11"},{"journal-title":"Software Engineering A Practitioner's Approach","year":"2010","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2018.00018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP49350.2019.00017"},{"key":"ref15","article-title":"A Software Engineering Perspective on Engineering Machine Learning Systems: State of the Art and Challenges","volume":"2","author":"giray","year":"2021","journal-title":"International Journal of Systems and Software"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00095"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970178"},{"key":"ref18","article-title":"The 2020 State of Engineering Practices for Machine Learning","author":"serban","year":"0","journal-title":"Proc ACM\/IEEE '20 14th IEEE International Symposium in empirical software and measurement (ESEM)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2985775"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2014.6927748"},{"key":"ref27","article-title":"Software Engineering Using Artificial Intelligence Techniques: Current State and Open Problems","author":"hany","year":"2012","journal-title":"ICC 2012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7337004"},{"key":"ref6","first-page":"559","article-title":"A paper review on software engineering areas inplementing data minig tools and techniques","volume":"13","author":"dhamija","year":"2017","journal-title":"Global Journal of Computational Intelligence Research"},{"key":"ref5","article-title":"Toward Data Mining: A Software Engineering approach, Informasion System, Issue 1, 2009","author":"marban","year":"2009","journal-title":"Science Direct Information Systems journal"},{"article-title":"Questions for data scientists in software engineering: a replication","year":"2021","author":"huijgens","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884783"},{"key":"ref2","first-page":"95","article-title":"A critical review of data warehouse","volume":"1","author":"chaudhary","year":"2011","journal-title":"Global Journal of Business Management and Information Technology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00042"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2019.00022"},{"article-title":"Software Engineering Theory and Practice","year":"2010","author":"pfleeger","key":"ref20"},{"journal-title":"Artificial Intelligence and Software Engineering Understanding the promise of the future Routledge Taylor and Francis group","year":"1998","author":"partridge","key":"ref22"},{"article-title":"Python machine learning","year":"2019","author":"raschka","key":"ref21"},{"year":"2004","author":"j\u00f6rg","key":"ref24"},{"journal-title":"Deep Learning with Python","year":"2018","author":"chollet","key":"ref23"},{"year":"2020","key":"ref26"},{"journal-title":"Research Priorities for Robust and Beneficial Artificial Intelligence","year":"2005","author":"russell","key":"ref25"}],"event":{"name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2021,6,28]]},"location":"Elazig, Turkey","end":{"date-parts":[[2021,6,29]]}},"container-title":["2021 9th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9486290\/9486287\/09486319.pdf?arnumber=9486319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:09:50Z","timestamp":1659485390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9486319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isdfs52919.2021.9486319","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}