{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:32:40Z","timestamp":1762252360140,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2892648","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"719-721","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Security expert recommender in software engineering"],"prefix":"10.1145","author":[{"given":"Shahab","family":"Bayati","sequence":"first","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"11","volume-title":"2010 7th IEEE Working Conference on","author":"Gegick M.","year":"2010","unstructured":"M. Gegick , P. Rotella , and T. Xie , \" Identifying security bug reports via text mining: An industrial case study,\" in Mining Software Repositories (MSR) , 2010 7th IEEE Working Conference on , 2010 , pp. 11 -- 20 . M. Gegick, P. Rotella, and T. Xie, \"Identifying security bug reports via text mining: An industrial case study,\" in Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, 2010, pp. 11--20."},{"key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.118"},{"key":"e_1_3_2_1_4_1","first-page":"38","article-title":"Example overflow: Using social media for code recommendation","author":"Zagalsky A.","year":"2012","unstructured":"A. Zagalsky , O. Barzilay , and A. Yehudai , \" Example overflow: Using social media for code recommendation ,\" in Proceedings of the Third International Workshop on Recommendation Systems for Software Engineering , 2012 , pp. 38 -- 42 . A. Zagalsky, O. Barzilay, and A. Yehudai, \"Example overflow: Using social media for code recommendation,\" in Proceedings of the Third International Workshop on Recommendation Systems for Software Engineering, 2012, pp. 38--42.","journal-title":"Proceedings of the Third International Workshop on Recommendation Systems for Software Engineering"},{"key":"e_1_3_2_1_5_1","first-page":"53","volume-title":"Why, when, and what: analyzing stack overflow questions by topic, type, and code,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Allamanis M.","year":"2013","unstructured":"M. Allamanis and C. Sutton , \" Why, when, and what: analyzing stack overflow questions by topic, type, and code,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 53 -- 56 . M. Allamanis and C. Sutton, \"Why, when, and what: analyzing stack overflow questions by topic, type, and code,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 53--56."},{"key":"e_1_3_2_1_6_1","first-page":"97","volume-title":"Answering questions about unanswered questions of stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Asaduzzaman M.","year":"2013","unstructured":"M. Asaduzzaman , A. S. Mashiyat , C. K. Roy , and K. A. Schneider , \" Answering questions about unanswered questions of stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 97 -- 100 . M. Asaduzzaman, A. S. Mashiyat, C. K. Roy, and K. A. Schneider, \"Answering questions about unanswered questions of stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 97--100."},{"key":"e_1_3_2_1_7_1","first-page":"31","volume-title":"Asking for (and about) permissions used by android apps,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Stevens R.","year":"2013","unstructured":"R. Stevens , J. Ganz , V. Filkov , P. Devanbu , and H. Chen , \" Asking for (and about) permissions used by android apps,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 31 -- 40 . R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen, \"Asking for (and about) permissions used by android apps,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 31--40."},{"key":"e_1_3_2_1_8_1","first-page":"89","volume-title":"Building reputation in stackoverflow: an empirical investigation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Bosu A.","year":"2013","unstructured":"A. Bosu , C. S. Corley , D. Heaton , D. Chatterji , J. C. Carver , and N. A. Kraft , \" Building reputation in stackoverflow: an empirical investigation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 89 -- 92 . A. Bosu, C. S. Corley, D. Heaton, D. Chatterji, J. C. Carver, and N. A. Kraft, \"Building reputation in stackoverflow: an empirical investigation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 89--92."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370779"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.530"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2487832"},{"key":"e_1_3_2_1_12_1","first-page":"93","volume-title":"An exploratory analysis of mobile development issues using stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Linares-V\u00e1squez M.","year":"2013","unstructured":"M. Linares-V\u00e1squez , B. Dit , and D. Poshyvanyk , \" An exploratory analysis of mobile development issues using stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 93 -- 96 . M. Linares-V\u00e1squez, B. Dit, and D. Poshyvanyk, \"An exploratory analysis of mobile development issues using stack overflow,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 93--96."},{"key":"e_1_3_2_1_13_1","first-page":"297","volume-title":"Using developer interaction data to compare expertise metrics,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Robbes R.","year":"2013","unstructured":"R. Robbes and D. R\u00f6thlisberger , \" Using developer interaction data to compare expertise metrics,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 297 -- 300 . R. Robbes and D. R\u00f6thlisberger, \"Using developer interaction data to compare expertise metrics,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 297--300."},{"key":"e_1_3_2_1_14_1","first-page":"2","volume-title":"Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories","author":"Shokripour R.","year":"2013","unstructured":"R. Shokripour , J. Anvik , Z. M. Kasirun , and S. Zamani , \" Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories , 2013 , pp. 2 -- 11 . R. Shokripour, J. Anvik, Z. M. Kasirun, and S. Zamani, \"Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation,\" in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 2--11."},{"key":"e_1_3_2_1_15_1","first-page":"22","volume-title":"2013 10th IEEE Working Conference on","author":"Naguib H.","year":"2013","unstructured":"H. Naguib , N. Narayan , B. Brugge , and D. Helal , \" Bug report assignee recommendation using activity profiles,\" in Mining Software Repositories (MSR) , 2013 10th IEEE Working Conference on , 2013 , pp. 22 -- 30 . H. Naguib, N. Narayan, B. Brugge, and D. Helal, \"Bug report assignee recommendation using activity profiles,\" in Mining Software Repositories (MSR), 2013 10th IEEE Working Conference on, 2013, pp. 22--30."},{"key":"e_1_3_2_1_16_1","first-page":"63","volume-title":"2012 Third International Workshop on","author":"Steinmacher I.","year":"2012","unstructured":"I. Steinmacher , I. S. Wiese , and M. A. Gerosa , \" Recommending mentors to software project newcomers,\" in Recommendation Systems for Software Engineering (RSSE) , 2012 Third International Workshop on , 2012 , pp. 63 -- 67 . I. Steinmacher, I. S. Wiese, and M. A. Gerosa, \"Recommending mentors to software project newcomers,\" in Recommendation Systems for Software Engineering (RSSE), 2012 Third International Workshop on, 2012, pp. 63--67."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2012.07.002"},{"key":"e_1_3_2_1_18_1","volume-title":"A Dataset of High Impact Bugs: Manually-Classified Issue Reports","author":"Ohira M.","year":"2014","unstructured":"M. Ohira , Y. Kashiwa , Y. Yamatani , H. Yoshiyuki , Y. Maeda , N. Limsettho , , \" A Dataset of High Impact Bugs: Manually-Classified Issue Reports ,\" 2014 . M. Ohira, Y. Kashiwa, Y. Yamatani, H. Yoshiyuki, Y. Maeda, N. Limsettho, et al., \"A Dataset of High Impact Bugs: Manually-Classified Issue Reports,\" 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508180"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597117"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025542915514"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2892648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2892648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:54Z","timestamp":1750221534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2892648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":22,"alternative-id":["10.1145\/2889160.2892648","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2892648","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}