{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:52Z","timestamp":1750219732689,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,7]]},"DOI":"10.1145\/3607505.3607512","type":"proceedings-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T16:33:41Z","timestamp":1692635621000},"page":"19-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0843-5899","authenticated-orcid":false,"given":"Agrim","family":"Sachdeva","sequence":"first","affiliation":[{"name":"Indiana University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8793-9613","authenticated-orcid":false,"given":"Ben","family":"Lazarine","sequence":"additional","affiliation":[{"name":"Indiana University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6794-0230","authenticated-orcid":false,"given":"Hongyi","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-805X","authenticated-orcid":false,"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[{"name":"Indiana University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2020 State of the Octoverse: Finding Balance Between Work and Play","author":"Forsgren N.","year":"2021","unstructured":"Forsgren , N. , Ceccarelli , G. , Jedamski , D. , Kelly , S. and Sullivan , C . 2020 State of the Octoverse: Finding Balance Between Work and Play ( 2021 ). Forsgren, N., Ceccarelli, G., Jedamski, D., Kelly, S. and Sullivan, C. 2020 State of the Octoverse: Finding Balance Between Work and Play (2021)."},{"key":"e_1_3_2_1_2_1","first-page":"863","volume-title":"An Empirical Study Of Security Culture In Open Source Software Communities. 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"Wen S.-F.","year":"2019","unstructured":"Wen , S.-F. , Kianpour , M. and Kowalski , S . An Empirical Study Of Security Culture In Open Source Software Communities. 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) ( 2019 ), 863 - 870 . Wen, S.-F., Kianpour, M. and Kowalski, S. An Empirical Study Of Security Culture In Open Source Software Communities. 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2019), 863-870."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Lazarine B. Samtani S. Patton M. Zhu H. Ullman S. Ampel B. and Chen H. Identifying Vulnerable Github Repositories And Users In Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI) (2020) 1-6.  Lazarine B. Samtani S. Patton M. Zhu H. Ullman S. Ampel B. and Chen H. Identifying Vulnerable Github Repositories And Users In Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI) (2020) 1-6.","DOI":"10.1109\/ISI49825.2020.9280544"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume":"26","author":"Mart\u00ednez-Torres M. R.","year":"2014","unstructured":"Mart\u00ednez-Torres , M. R. and D\u00edaz-Fern\u00e1ndez , M. C. Current Issues And Research Trends On Open-Source Software Communities. Technology Analysis & Strategic Management , 26 , 1 ( 2014 ), 55-68. Mart\u00ednez-Torres, M. R. and D\u00edaz-Fern\u00e1ndez, M. C. Current Issues And Research Trends On Open-Source Software Communities. Technology Analysis & Strategic Management, 26, 1 (2014), 55-68.","journal-title":"Current Issues And Research Trends On Open-Source Software Communities. Technology Analysis & Strategic Management"},{"key":"e_1_3_2_1_5_1","unstructured":"GitGuardian State of the Secrets Sprawl. 2021.  GitGuardian State of the Secrets Sprawl. 2021."},{"key":"e_1_3_2_1_6_1","volume-title":"9th Workshop on Cyber Security Experimentation and Test (CSET 16)","author":"Nord R. L.","year":"2016","unstructured":"Nord , R. L. , Ozkaya , I. , Schwartz , E. J. , Shull , F. and Kazman , R . Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? 9th Workshop on Cyber Security Experimentation and Test (CSET 16) ( 2016 ). Nord, R. L., Ozkaya, I., Schwartz, E. J., Shull, F. and Kazman, R. Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? 9th Workshop on Cyber Security Experimentation and Test (CSET 16) (2016)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3485754.3485760"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.84"},{"key":"e_1_3_2_1_9_1","volume-title":"When Enough Is Enough: Investigating The Antecedents And Consequences Of Information Security Fatigue. Information Systems Journal, 31, 4","author":"Cram W. A.","year":"2021","unstructured":"Cram , W. A. , Proudfoot , J. G. and D'Arcy , J. When Enough Is Enough: Investigating The Antecedents And Consequences Of Information Security Fatigue. Information Systems Journal, 31, 4 ( 2021 ), 521-549. Cram, W. A., Proudfoot, J. G. and D'Arcy, J. When Enough Is Enough: Investigating The Antecedents And Consequences Of Information Security Fatigue. Information Systems Journal, 31, 4 (2021), 521-549."},{"key":"e_1_3_2_1_10_1","first-page":"407","volume-title":"The Fog Of Warnings: How Non-Essential Notifications Blur With Security Warnings Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Vance A.","year":"2019","unstructured":"Vance , A. , Eargle , D. , Jenkins , J. L. , Kirwan , C. B. and Anderson , B. B . The Fog Of Warnings: How Non-Essential Notifications Blur With Security Warnings Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) ( 2019 ), 407 - 420 . Vance, A., Eargle, D., Jenkins, J. L., Kirwan, C. B. and Anderson, B. B. The Fog Of Warnings: How Non-Essential Notifications Blur With Security Warnings Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019), 407-420."},{"key":"e_1_3_2_1_11_1","first-page":"254","volume-title":"On the Use of Dependabot Security Pull Requests. 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR)","author":"Alfadel M.","year":"2021","unstructured":"Alfadel , M. , Costa , D. E. , Shihab , E. and Mkhallalati , M . On the Use of Dependabot Security Pull Requests. 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR) ( 2021 ), 254 - 265 . Alfadel, M., Costa, D. E., Shihab, E. and Mkhallalati, M. On the Use of Dependabot Security Pull Requests. 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR) (2021), 254-265."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117771"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/ICDIS.2018.00039","volume-title":"Combating Insider Threats By User Profiling From Activity Logging Data. 2018 1st International Conference on Data Intelligence and Security (ICDIS)","author":"Dahmane M.","year":"2018","unstructured":"Dahmane , M. and Foucher , S . Combating Insider Threats By User Profiling From Activity Logging Data. 2018 1st International Conference on Data Intelligence and Security (ICDIS) ( 2018 ), 194 - 199 . Dahmane, M. and Foucher, S. Combating Insider Threats By User Profiling From Activity Logging Data. 2018 1st International Conference on Data Intelligence and Security (ICDIS) (2018), 194-199."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103270"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/ICBK50248.2020.00071","volume-title":"Cyber-Guided Deep Neural Network For Malicious Repository Detection In Github. 2020 IEEE International Conference on Knowledge Graph (ICKG)","author":"Zhang Y.","year":"2020","unstructured":"Zhang , Y. , Fan , Y. , Hou , S. , Ye , Y. , Xiao , X. , Li , P. , Shi , C. , Zhao , L. and Xu , S . Cyber-Guided Deep Neural Network For Malicious Repository Detection In Github. 2020 IEEE International Conference on Knowledge Graph (ICKG) ( 2020 ), 458 - 465 . Zhang, Y., Fan, Y., Hou, S., Ye, Y., Xiao, X., Li, P., Shi, C., Zhao, L. and Xu, S. Cyber-Guided Deep Neural Network For Malicious Repository Detection In Github. 2020 IEEE International Conference on Knowledge Graph (ICKG) (2020), 458-465."},{"key":"e_1_3_2_1_16_1","volume-title":"How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. NDSS","author":"Meli M.","year":"2019","unstructured":"Meli , M. , McNiece , M. R. and Reaves , B . How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. NDSS ( 2019 ). Meli, M., McNiece, M. R. and Reaves, B. How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. NDSS (2019)."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Profiling Developer Expertise Across Software Communities With Heterogeneous Information Network Analysis Proceedings of the Tenth Asia-Pacific Symposium on Internetware","author":"Yan J.","year":"2018","unstructured":"Yan , J. , Sun , H. , Wang , X. , Liu , X. and Song , X . Profiling Developer Expertise Across Software Communities With Heterogeneous Information Network Analysis Proceedings of the Tenth Asia-Pacific Symposium on Internetware ( 2018 ), 1 - 9 . Yan, J., Sun, H., Wang, X., Liu, X. and Song, X. Profiling Developer Expertise Across Software Communities With Heterogeneous Information Network Analysis Proceedings of the Tenth Asia-Pacific Symposium on Internetware (2018), 1-9."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1145\/3022198.3026354","volume-title":"Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"Saxena R.","year":"2017","unstructured":"Saxena , R. and Pedanekar , N . I Know What You Coded Last Summer: Mining Candidate Expertise From Github Repositories . Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing ( 2017 ), 299 - 302 . Saxena, R. and Pedanekar, N. I Know What You Coded Last Summer: Mining Candidate Expertise From Github Repositories. Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 299-302."},{"key":"e_1_3_2_1_19_1","first-page":"100070","volume":"16","author":"Bidoki N. H.","year":"2020","unstructured":"Bidoki , N. H. , Schiappa , M. , Sukthankar , G. and Garibay , I. Modeling Social Coding Dynamics With Sampled Historical Data. Online Social Networks and Media , 16 ( 2020 ), 100070 . Bidoki, N. H., Schiappa, M., Sukthankar, G. and Garibay, I. Modeling Social Coding Dynamics With Sampled Historical Data. Online Social Networks and Media, 16 (2020), 100070.","journal-title":"Modeling Social Coding Dynamics With Sampled Historical Data. Online Social Networks and Media"},{"key":"e_1_3_2_1_20_1","first-page":"205","volume":"117","author":"Guo Z.","year":"2021","unstructured":"Guo , Z. , Tang , L. , Guo , T. , Yu , K. , Alazab , M. and Shalaginov , A. Deep Graph Neural Network-Based Spammer Detection Under The Perspective Of Heterogeneous Cyberspace. Future Generation Computer Systems , 117 ( 2021 ), 205 - 218 . Guo, Z., Tang, L., Guo, T., Yu, K., Alazab, M. and Shalaginov, A. Deep Graph Neural Network-Based Spammer Detection Under The Perspective Of Heterogeneous Cyberspace. Future Generation Computer Systems, 117 (2021), 205-218.","journal-title":"Deep Graph Neural Network-Based Spammer Detection Under The Perspective Of Heterogeneous Cyberspace. Future Generation Computer Systems"},{"key":"e_1_3_2_1_21_1","first-page":"18","author":"Sarkar P.","year":"2005","unstructured":"Sarkar , P. and Moore , A. Dynamic Social Network Analysis Using Latent Space Models. Advances in Neural Information Processing Systems , 18 ( 2005 ). Sarkar, P. and Moore, A. Dynamic Social Network Analysis Using Latent Space Models. Advances in Neural Information Processing Systems, 18 (2005).","journal-title":"Dynamic Social Network Analysis Using Latent Space Models. Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_22_1","volume-title":"Thirty-second AAAI Conference on Artificial Intelligence","author":"Zhang Z.","year":"2018","unstructured":"Zhang , Z. , Cui , P. , Pei , J. , Wang , X. and Zhu , W . TIMERS: Error-Bounded SVD Restart On Dynamic Networks , Thirty-second AAAI Conference on Artificial Intelligence ( 2018 ). Zhang, Z., Cui, P., Pei, J., Wang, X. and Zhu, W. TIMERS: Error-Bounded SVD Restart On Dynamic Networks, Thirty-second AAAI Conference on Artificial Intelligence (2018)."},{"key":"e_1_3_2_1_23_1","first-page":"969","volume-title":"Continuous-Time Dynamic Network Embeddings Companion Proceedings of the The Web Conference 2018","author":"Nguyen G. H.","year":"2018","unstructured":"Nguyen , G. H. , Lee , J. B. , Rossi , R. A. , Ahmed , N. K. , Koh , E. and Kim , S . Continuous-Time Dynamic Network Embeddings Companion Proceedings of the The Web Conference 2018 ( 2018 ), 969 - 976 . Nguyen, G. H., Lee, J. B., Rossi, R. A., Ahmed, N. K., Koh, E. and Kim, S. Continuous-Time Dynamic Network Embeddings Companion Proceedings of the The Web Conference 2018 (2018), 969-976."},{"key":"e_1_3_2_1_24_1","first-page":"2018 2086","volume-title":"IJCAI","author":"Du L.","year":"2018","unstructured":"Du , L. , Wang , Y. , Song , G. , Lu , Z. and Wang , J . Dynamic Network Embedding: An Extended Approach for Skip-gram based Network Embedding . IJCAI , 2018 ( 2018 ), 2086 - 2092 . Du, L., Wang, Y., Song, G., Lu, Z. and Wang, J. Dynamic Network Embedding: An Extended Approach for Skip-gram based Network Embedding. IJCAI, 2018 (2018), 2086-2092."},{"key":"e_1_3_2_1_25_1","volume-title":"Dynamic Network Embedding By Modeling Triadic Closure Process. Proceedings of the AAAI Conference on Artificial Intelligence, 32","author":"Zhou L.","year":"2018","unstructured":"Zhou , L. , Yang , Y. , Ren , X. , Wu , F. and Zhuang , Y . Dynamic Network Embedding By Modeling Triadic Closure Process. Proceedings of the AAAI Conference on Artificial Intelligence, 32 , 1 ( 2018 ). Zhou, L., Yang, Y., Ren, X., Wu, F. and Zhuang, Y. Dynamic Network Embedding By Modeling Triadic Closure Process. Proceedings of the AAAI Conference on Artificial Intelligence, 32, 1 (2018)."},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Learning Representations","author":"Trivedi R.","year":"2019","unstructured":"Trivedi , R. , Farajtabar , M. , Biswal , P. and Zha , H . Dyrep: Learning Representations over Dynamic Graphs . International Conference on Learning Representations ( 2019 ). Trivedi, R., Farajtabar, M., Biswal, P. and Zha, H. Dyrep: Learning Representations over Dynamic Graphs. International Conference on Learning Representations (2019)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330895"},{"key":"e_1_3_2_1_28_1","first-page":"10432","volume-title":"Continuous Graph Neural Networks. International Conference on Machine Learning","author":"Xhonneux L.-P.","year":"2020","unstructured":"Xhonneux , L.-P. , Qu , M. and Tang , J . Continuous Graph Neural Networks. International Conference on Machine Learning ( 2020 ), 10432 - 10441 . Xhonneux, L.-P., Qu, M. and Tang, J. Continuous Graph Neural Networks. International Conference on Machine Learning (2020), 10432-10441."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1145\/3459637.3482419","volume-title":"Proceedings of the 30th ACM International Conference on Information & Knowledge Management","author":"Zhang Y.","year":"2021","unstructured":"Zhang , Y. , Xiong , Y. , Li , D. , Shan , C. , Ren , K. and Zhu , Y . CoPE: Modeling Continuous Propagation and Evolution on Interaction Graph . Proceedings of the 30th ACM International Conference on Information & Knowledge Management ( 2021 ), 2627 - 2636 . Zhang, Y., Xiong, Y., Li, D., Shan, C., Ren, K. and Zhu, Y. CoPE: Modeling Continuous Propagation and Evolution on Interaction Graph. Proceedings of the 30th ACM International Conference on Information & Knowledge Management (2021), 2627-2636."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635922"}],"event":{"name":"CSET 2023: 2023 Cyber Security Experimentation and Test Workshop","acronym":"CSET 2023","location":"Marina del Rey CA USA"},"container-title":["2023 Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607505.3607512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:28Z","timestamp":1750178188000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607512"}},"subtitle":["Vulnerability Introduction Prediction in Social Coding Repositories"],"short-title":[],"issued":{"date-parts":[[2023,8,7]]},"references-count":30,"alternative-id":["10.1145\/3607505.3607512","10.1145\/3607505"],"URL":"https:\/\/doi.org\/10.1145\/3607505.3607512","relation":{},"subject":[],"published":{"date-parts":[[2023,8,7]]},"assertion":[{"value":"2023-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}