{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:36:18Z","timestamp":1761489378772,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591200","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"736-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Characteristics of the vulnerable code changes identified through peer code review"],"prefix":"10.1145","author":[{"given":"Amiangshu","family":"Bosu","sequence":"first","affiliation":[{"name":"University of Alabama, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"volume-title":"https:\/\/code.google.com\/p\/gerrit\/. {Online","year":"2013","key":"e_1_3_2_1_1_1","unstructured":"Gerrit code review tool. https:\/\/code.google.com\/p\/gerrit\/. {Online ; accessed 6- Sep- 2013 }. Gerrit code review tool. https:\/\/code.google.com\/p\/gerrit\/. {Online; accessed 6-Sep-2013}."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414721.2414726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2013.22"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.21"},{"key":"e_1_3_2_1_6_1","unstructured":"I. Feinerer. Introduction to the tm package text mining in r. http:\/\/cran.r-project.org\/web\/packages\/ tm\/index.html 2013.  I. Feinerer. Introduction to the tm package text mining in r. http:\/\/cran.r-project.org\/web\/packages\/ tm\/index.html 2013."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00199-4_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456370"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1121680"},{"key":"e_1_3_2_1_11_1","volume-title":"When a patch goes bad: Exploring the properties of vulnerability-contributing commits. page to appear","author":"Meneely A.","year":"2013","unstructured":"A. Meneely , H. Srinivasan , A. Musa , A. R. Tejeda , M. Mokary , and B. Spates . When a patch goes bad: Exploring the properties of vulnerability-contributing commits. page to appear , 2013 . A. Meneely, H. Srinivasan, A. Musa, A. R. Tejeda, M. Mokary, and B. Spates. When a patch goes bad: Exploring the properties of vulnerability-contributing commits. page to appear, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653717"},{"key":"e_1_3_2_1_13_1","unstructured":"Mitre Coroporation. Common weakness enumeration. http:\/\/cwe.mitre.org\/. {Online; accessed 6-Sep-2013}.  Mitre Coroporation. Common weakness enumeration. http:\/\/cwe.mitre.org\/. {Online; accessed 6-Sep-2013}."},{"key":"e_1_3_2_1_14_1","first-page":"48","volume-title":"Proceedings of the Tenth International Workshop on Mining Software Repositories","author":"Mukadam M.","unstructured":"M. Mukadam , C. Bird , and P. C. Rigby . Gerrit software code review data from android . In Proceedings of the Tenth International Workshop on Mining Software Repositories , pages 45\u2013 48 . IEEE Press, 2013. M. Mukadam, C. Bird, and P. C. Rigby. Gerrit software code review data from android. In Proceedings of the Tenth International Workshop on Mining Software Repositories, pages 45\u201348. IEEE Press, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"e_1_3_2_1_16_1","volume-title":"The open web application security project. https:\/\/www.owasp.org\/index.php\/ Category:Vulnerability","author":"OWASP.","year":"2013","unstructured":"OWASP. The open web application security project. https:\/\/www.owasp.org\/index.php\/ Category:Vulnerability , 2013 . {Online; accessed 1-Sep-2013}. OWASP. The open web application security project. https:\/\/www.owasp.org\/index.php\/ Category:Vulnerability, 2013. {Online; accessed 1-Sep-2013}."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314215"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:30Z","timestamp":1750230090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":20,"alternative-id":["10.1145\/2591062.2591200","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591200","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}