{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:16Z","timestamp":1767581416143,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590918","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Review on Software Defect Prediction Using Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8381-1112","authenticated-orcid":false,"given":"Shikha","family":"Gautam","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Poornima University, India and \rSchool of Computer Engineering, Poornima University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5335-9434","authenticated-orcid":false,"given":"Ajay","family":"Khunteta","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Poornima University, India and \rSchool of Computer Engineering, Poornima University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3169-2065","authenticated-orcid":false,"given":"Debolina","family":"Ghosh","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Poornima University, India and \rSchool of Computer Engineering, Poornima University, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A comparison of some soft computing methods for software fault prediction. Expert systems with applications, 42(4)","author":"Erturk E.","year":"2015","unstructured":"Erturk, E., & Sezer, E. A. (2015). A comparison of some soft computing methods for software fault prediction. Expert systems with applications, 42(4), 1872-1879."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9230-x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.01.033"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2012.8.2.241"},{"issue":"7","key":"e_1_3_2_1_5_1","first-page":"199","article-title":"Software fault prediction model using clustering algorithms determining the number of clusters automatically","volume":"8","author":"Park M.","year":"2014","unstructured":"Park, M., & Hong, E. (2014). Software fault prediction model using clustering algorithms determining the number of clusters automatically. International Journal of Software Engineering and Its Applications, 8(7), 199-204.","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624057"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0092-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-011-0316-x"},{"key":"e_1_3_2_1_11_1","volume-title":"Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities","author":"Shin Y.","year":"2010","unstructured":"Shin, Y., Meneely, A., Williams, L., & Osborne, J. A. (2010). Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE transactions on software engineering, 37(6), 772-787."},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"56","article-title":"Predicting fault-prone software module using data mining technique and fuzzy logic","volume":"2","author":"Pandey A. K.","year":"2010","unstructured":"Pandey, A. K., & Goyal, N. K. (2010). Predicting fault-prone software module using data mining technique and fuzzy logic. International Journal of Computer and Communication Technology, 2(2), 56-63.","journal-title":"International Journal of Computer and Communication Technology"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73460-4_27"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-007-9013-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"e_1_3_2_1_16_1","volume-title":"Object-oriented software fault prediction using neural networks. Information and software technology, 49(5), 483-492","author":"Kanmani S.","year":"2007","unstructured":"Kanmani, S., Uthariaraj, V. R., Sankaranarayanan, V., & Thambidurai, P. (2007). Object-oriented software fault prediction using neural networks. Information and software technology, 49(5), 483-492."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213008003947"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2006.23"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000042059.16470.f0"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.034"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.005"},{"key":"e_1_3_2_1_22_1","volume-title":"Data mining static code attributes to learn defect predictors","author":"Menzies T.","year":"2006","unstructured":"Menzies, T., Greenwald, J., & Frank, A. (2006). Data mining static code attributes to learn defect predictors. IEEE transactions on software engineering, 33(1), 2-13."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2853073.2853083"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.001"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868357"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316002"},{"key":"e_1_3_2_1_27_1","volume-title":"Identification of defect-prone classes in telecommunication software systems using design metrics. Information sciences, 176(24), 3711-3734","author":"Janes A.","year":"2006","unstructured":"Janes, A., Scotto, M., Pedrycz, W., Russo, B., Stefanovic, M., & Succi, G. (2006). Identification of defect-prone classes in telecommunication software systems using design metrics. Information sciences, 176(24), 3711-3734."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9102138"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1696-z"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.06.025"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.001"}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:45:40Z","timestamp":1767581140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":32,"alternative-id":["10.1145\/3590837.3590918","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590918","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}