{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T15:03:54Z","timestamp":1750431834364,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Software Center","award":["Development Metrics"],"award-info":[{"award-number":["Development Metrics"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,19]]},"DOI":"10.1145\/3475960.3475987","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T02:19:53Z","timestamp":1629339593000},"page":"40-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A classification of code changes and test types dependencies for improving machine learning based test selection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2571-5099","authenticated-orcid":false,"given":"Khaled","family":"Al-Sabbagh","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Sweden \/ University of Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9052-0864","authenticated-orcid":false,"given":"Miroslaw","family":"Staron","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Sweden \/ University of Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1459-2081","authenticated-orcid":false,"given":"Regina","family":"Hebig","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Sweden \/ University of Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9226-5417","authenticated-orcid":false,"given":"Francisco","family":"Gomes","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Sweden \/ University of Gothenburg, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2021,8,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. ISO\/IEC\/IEEE International Standard - Software and systems engineering \u2013Software testing\u2013Part 1: Concepts and definitions. 1\u201350."},{"key":"e_1_3_2_1_2_1","volume-title":"Predicting Test Case Verdicts Using Textual Analysis of Committed Code Churns. In (IWSM Mensura","author":"Al-Sabbagh Khaled Walid","year":"2019","unstructured":"Khaled Walid Al-Sabbagh, Miroslaw Staron, Regina Hebig, and Wilhelm Meding. 2019. Predicting Test Case Verdicts Using Textual Analysis of Committed Code Churns. In (IWSM Mensura 2019). 2476, 138\u2013153."},{"key":"e_1_3_2_1_3_1","volume-title":"A taxonomy of security faults in the unix operating system. Master\u2019s thesis","author":"Aslam Taimur","year":"1995","unstructured":"Taimur Aslam. 1995. A taxonomy of security faults in the unix operating system. Master\u2019s thesis, Purdue University, 199, 5 (1995)."},{"volume-title":"Complete Guide to Test Automation","author":"Axelrod Arnon","key":"e_1_3_2_1_4_1","unstructured":"Arnon Axelrod. 2018. Complete Guide to Test Automation. Springer."},{"key":"e_1_3_2_1_5_1","first-page":"5","article-title":"Software complexity and maintainability","volume":"11","author":"Banker Rajiv D","year":"1989","unstructured":"Rajiv D Banker, Srikant M Datar, and Dani Zweig. 1989. Software complexity and maintainability. Age, 11, 5.6 (1989), 3.","journal-title":"Age"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.177364"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)85785-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1295074.1295089"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00028"},{"key":"e_1_3_2_1_11_1","unstructured":"Michael Felderer and Ina Schieferdecker. 2019. A taxonomy of risk-based testing. arXiv preprint arXiv:1912.11519."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287634"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658079"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCoSE.2015.11"},{"key":"e_1_3_2_1_16_1","unstructured":"Barbara H Kwasnik. 1999. The role of classification in knowledge representation and discovery."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1989.105573"},{"key":"e_1_3_2_1_18_1","volume-title":"2010 Second World Congress on Software Engineering. 2, 234\u2013240","author":"Li Ning","year":"2010","unstructured":"Ning Li, Zhanhuai Li, and Xiling Sun. 2010. Classification of software defect detected by black-box testing: An empirical study. In 2010 Second World Congress on Software Engineering. 2, 234\u2013240."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.017"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746198"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"e_1_3_2_1_23_1","volume-title":"The 33rd International Convention MIPRO. 418\u2013422","author":"Novak Jernej","year":"2010","unstructured":"Jernej Novak and Andrej Krajnc. 2010. Taxonomy of static code analysis tools. In The 33rd International Convention MIPRO. 418\u2013422."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1647636.1647639"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851571"},{"key":"e_1_3_2_1_26_1","unstructured":"A. Sawant Pranit H Bari and P. Chawan. 2012. Software Testing Techniques and Strategies."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Robert C Seacord and Allen D Householder. 2005. A structured approach to classifying security vulnerabilities. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.","DOI":"10.21236\/ADA430968"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.01.006"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.13"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180254"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_3_2_1_32_1","volume-title":"Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree. In International Conference on Computer and Computing Technologies in Agriculture. 232\u2013241","author":"Yan Zhang","year":"2013","unstructured":"Zhang Yan, Dong Guowei, Guo Tao, and Yang Jianyu. 2013. Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree. In International Conference on Computer and Computing Technologies in Agriculture. 232\u2013241."},{"volume-title":"Formal Methods for Protocol Engineering and Distributed Systems","author":"Zhang Jian","key":"e_1_3_2_1_33_1","unstructured":"Jian Zhang, Shing-Chi Cheung, and Samuel T Chanson. 1999. Stress testing of distributed multimedia software systems. In Formal Methods for Protocol Engineering and Distributed Systems. Springer, 119\u2013133."}],"event":{"name":"PROMISE '21: 17th International Conference on Predictive Models and Data Analytics in Software Engineering","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Athens Greece","acronym":"PROMISE '21"},"container-title":["Proceedings of the 17th International Conference on Predictive Models and Data Analytics in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475960.3475987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475960.3475987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:33Z","timestamp":1750195713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475960.3475987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,19]]},"references-count":31,"alternative-id":["10.1145\/3475960.3475987","10.1145\/3475960"],"URL":"https:\/\/doi.org\/10.1145\/3475960.3475987","relation":{},"subject":[],"published":{"date-parts":[[2021,8,19]]},"assertion":[{"value":"2021-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}