{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T17:02:03Z","timestamp":1770051723837,"version":"3.49.0"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/tse.2020.3023664","type":"journal-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T21:02:54Z","timestamp":1599858174000},"page":"1497-1514","source":"Crossref","is-referenced-by-count":37,"title":["An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples"],"prefix":"10.1109","volume":"48","author":[{"given":"Morteza","family":"Verdi","sequence":"first","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0023-9543","authenticated-orcid":false,"given":"Ashkan","family":"Sami","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Jafar","family":"Akhondali","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5704-4173","authenticated-orcid":false,"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[{"name":"Polytechnique Montreal, Montr&#x00E9;al, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2351-0885","authenticated-orcid":false,"given":"Gias","family":"Uddin","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Alireza Karami","family":"Motlagh","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/52.311048"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227181"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9379-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786855"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405249"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.13"},{"issue":"2","key":"ref11","first-page":"155","article-title":"Studying reuse of out-dated third-party code in open source projects","volume":"9","author":"Xia","year":"2014","journal-title":"Inf. Media Technol."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2900307"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884629"},{"key":"ref14","article-title":"TIOBE index for January 2019","year":"2019"},{"key":"ref15","first-page":"319","article-title":"SOTorrent: Reconstructing and analyzing the evolution of stack overflow posts","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Baltes"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568313"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115681"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.038"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357191"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742129"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.51"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.80"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.35"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182521"},{"key":"ref30","first-page":"16","article-title":"What questions do programmers ask about configuration as code?","volume-title":"Proc. 4th Int. Workshop Rapid Continuous Softw. Eng.","author":"Rahman"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00040"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882435"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518944"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979366"},{"key":"ref36","first-page":"232","article-title":"Searching stack overflow for API-usage-related bug fixes using snippet-based queries","volume-title":"Proc. 26th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Campos"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00048"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9650-5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00065"},{"key":"ref41","article-title":"An empirical case study on stack overflow to explore developers\u2019 security challenges","author":"Rahman","year":"2016"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1672-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"ref46","article-title":"Security vulnerabilities of the top ten programming languages: C, Java, C++, Objective-C, C#, PHP, Visual Basic, Python, Perl, and Ruby","volume":"5","author":"Turner","year":"2014","journal-title":"J. Technol. Res."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00033"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.686"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597117"},{"key":"ref50","first-page":"81","article-title":"Security developer studies with GitHub users: Exploring a convenience sample","volume-title":"Proc. 13th Symp. Usable Privacy Secur.","author":"Acar"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2903039"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9150-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00031"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597077"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884800"},{"key":"ref56","article-title":"Leveraging flawed tutorials for seeding large-scale web vulnerability discovery","volume-title":"Proc. 11th USENIX Conf. Offensive Technol. (WOOT17)","author":"Unruh"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"ref59","article-title":"Algorithmia syntaxnet programming language identification","year":"2019"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref61","volume-title":"SEI CERT C++ Coding Standard, Rules for Developing Safe, Reliable, and Secure Systems in C++. CERT of Carnegie Mellon University","author":"Ballman","year":"2016"},{"key":"ref62","article-title":"Deprecating rand() and Friends","author":"Brown","year":"2019"},{"key":"ref63","article-title":"Free-marginal multirater kappa: An alternative to fleiss\u2019 FixedMarginal multirater kappa","author":"Randolph","year":"2019"},{"key":"ref64","article-title":"CWE mitre","year":"2018"},{"key":"ref65","article-title":"CWE 193","year":"2018"},{"key":"ref66","article-title":"CWE 754","year":"2018"},{"key":"ref69","article-title":"CWE 252","year":"2018"},{"key":"ref70","article-title":"CWE 426","year":"2018"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115624"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294276"},{"key":"ref74","article-title":"CWE 789","year":"2018"},{"key":"ref75","article-title":"CWE 125","year":"2018"},{"key":"ref76","article-title":"CWE 1019","year":"2018"},{"key":"ref77","article-title":"CWE 20","year":"2018"},{"key":"ref78","article-title":"Announcing syntaxnet: The worlds most accurate parser goes open source","year":"2019"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884840"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9775544\/09195034.pdf?arnumber=9195034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:21:10Z","timestamp":1704842470000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9195034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":75,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2020.3023664","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}