{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:07:35Z","timestamp":1772928455669,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"United States Office of Naval Research","award":["N000141210147"],"award-info":[{"award-number":["N000141210147"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/tr.2016.2630503","type":"journal-article","created":{"date-parts":[[2016,12,9]],"date-time":"2016-12-09T20:03:43Z","timestamp":1481313823000},"page":"17-37","source":"Crossref","is-referenced-by-count":48,"title":["The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models"],"prefix":"10.1109","volume":"66","author":[{"given":"Jeffrey","family":"Stuckman","sequence":"first","affiliation":[]},{"given":"James","family":"Walden","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9190-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591200"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1201\/b10328","author":"torgo","year":"2010","journal-title":"Data Mining with R Learning with Case Studies"},{"key":"ref32","article-title":"Smote: Synthetic minority over-sampling technique","author":"chawla","year":"2011","journal-title":"arXiv 1106 1813"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.1.2.130"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v048.i02"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.19"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698912"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05415-0_18"},{"key":"ref62","year":"2016","journal-title":"All metrics thresholds in McCabe IQ"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/32.489070"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0164-1212(94)90099-X","article-title":"Candidate metrics for object-oriented software within a taxonomy framework","volume":"26","author":"carapu\u00e7a","year":"1994","journal-title":"J Syst Softw"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/32.268921"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.32"},{"key":"ref1","article-title":"Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug","author":"williams","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1999.802296"},{"key":"ref22","first-page":"855","article-title":"Feature subset selection: A correlation based filter approach","author":"hall","year":"1997","journal-title":"Proc Int Conf Neural Inf Process Intell Inf Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2005.11.014"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390277"},{"key":"ref23","article-title":"Fselector: Selecting attributes","author":"romanski","year":"2014"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/800003.807911"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.10.024"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref59","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021716832057"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1989.714426"},{"key":"ref56","article-title":"Use of factor analysis to develop OOP software complexity metrics","author":"lake","year":"1994","journal-title":"Proceedings of the Annual Oregon Workshop on Software Metrics"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597078"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13577-4_41"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.32"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"ref40","first-page":"4:1","article-title":"Which is the right source for vulnerability studies? An empirical analysis on Mozilla Firefox","author":"massacci","year":"2010","journal-title":"Proc 6th Int Workshop Security Measur Metrics"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"ref13","article-title":"Osvdb: The open source vulnerability database","year":"2013"},{"key":"ref14","article-title":"Exploit db.","year":"0"},{"key":"ref15","article-title":"National vulnerability database","year":"2013"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083147","article-title":"When do changes induce fixes?","volume":"30","author":"sliwerski","year":"2005","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"ref17","article-title":"Design and implementation of a PHP compiler front-end","author":"de vries","year":"2007"},{"key":"ref18","first-page":"1289","article-title":"An extensive empirical study of feature selection metrics for text classification","volume":"3","author":"forman","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321709"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698898"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568269"},{"key":"ref8","article-title":"The known unknowns: Empirical analysis of publicly unknown vulnerabilities","author":"frei","year":"2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref9","article-title":"The promise repository of empirical software engineering data","author":"menzies","year":"2015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351733"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606610"},{"key":"ref48","first-page":"545","article-title":"Security of open source web applications","author":"walden","year":"2009","journal-title":"Proc 3rd Int Symp Empirical Softw Eng Meas"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2372225.2372230"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484377"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456370"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/7867805\/07779151.pdf?arnumber=7779151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:19:56Z","timestamp":1642004396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7779151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":62,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tr.2016.2630503","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}