{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:07:47Z","timestamp":1776442067823,"version":"3.51.2"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266506","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-7","source":"Crossref","is-referenced-by-count":20,"title":["Mining social networks for software vulnerabilities monitoring"],"prefix":"10.1109","author":[{"given":"Slim","family":"Trabelsi","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Plate","sequence":"additional","affiliation":[]},{"given":"Amine","family":"Abida","sequence":"additional","affiliation":[]},{"given":"M. Marouane","family":"Ben Aoun","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Zouaoui","sequence":"additional","affiliation":[]},{"given":"Chedy","family":"Missaoui","sequence":"additional","affiliation":[]},{"given":"Sofien","family":"Gharbi","sequence":"additional","affiliation":[]},{"given":"Alaeddine","family":"Ayari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"205","article-title":"Application of social network analysis to the study of open source software","author":"jin","year":"2006","journal-title":"The economics of open source software development"},{"key":"ref11","first-page":"31","article-title":"Towards un-derstanding twitter use in software engineering: preliminary findings, ongoing challenges and future questions","author":"gargi","year":"2011","journal-title":"Proceedings of the 2nd International Workshop on Web 2 0 for Software Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224287"},{"key":"ref13","first-page":"195","article-title":"Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis","author":"ashish","year":"2011","journal-title":"Proceedings of the 4th India Software Engineering Conference"},{"key":"ref14","article-title":"Vulnerability Exploits Advertised on Twitter","author":"arafin","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_43"},{"key":"ref4","article-title":"The KPI-Based Reputation Policy Language","author":"slim","year":"2011","journal-title":"2011 The Fifth International Conference on Sensor Technologies and Applications"},{"key":"ref3","first-page":"247","article-title":"What does software engineering community microblog about? In Mining Software Repositories (MSR)","author":"tian","year":"2012","journal-title":"9th IEEE Working Conference on"},{"key":"ref6","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proc of the Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762010000200006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138016"},{"key":"ref7","first-page":"2231","article-title":"Analysis of Social net-working sites using K-mean Clustering algorithm","author":"rajput","year":"2012","journal-title":"International Journal of Computer & Communication Technology (IJCCT)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1984701.1984707"},{"key":"ref1","article-title":"Mining the Temporal Evolution of the Android Bug Reporting Community via Sliding Windows","author":"feng","year":"2013"},{"key":"ref9","first-page":"269","article-title":"Mining collaboration patterns from a large developer net-work","author":"surian","year":"2010"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2015,7,27]]},"end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266506.pdf?arnumber=7266506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:42:23Z","timestamp":1490391743000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266506","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}