{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:55Z","timestamp":1740149035676,"version":"3.37.3"},"reference-count":23,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T00:00:00Z","timestamp":1551916800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Advanced Program of Postdoctoral Scientific Research","award":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"],"award-info":[{"award-number":["2016YFB0800700","61472341","61772449","61572420","61807028","61802332","F2016203330","B2017003005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,3,7]]},"abstract":"<jats:p>The increasement of software complexity directly results in the augment of software fault and costs a lot in the process of software development and maintenance. The complex network model is used to study the accumulation and accumulation of faults in complex software as a whole. Then key nodes with high fault probability and powerful fault propagation capability can be found, and the faults can be discovered as soon as possible and the severity of the damage to the system can be reduced effectively. In this paper, the algorithm MFS_AN (mining fault severity of all nodes) is proposed to mine the key nodes from software network. A weighted software network model is built by using functions as nodes, call relationships as edges, and call times as weight. Exploiting recursive method, a fault probability metric FP of a function, is defined according to the fault accumulation characteristic, and a fault propagation capability metric FPC of a function is proposed according to the fault propagation characteristic. Based on the FP and FPC, the fault severity metric FS is put forward to obtain the function nodes with larger fault severity in software network. Experimental results on two real software networks show that the algorithm MFS_AN can discover the key function nodes correctly and effectively.<\/jats:p>","DOI":"10.1155\/2019\/7140480","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:35:10Z","timestamp":1551983710000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation"],"prefix":"10.1155","volume":"2019","author":[{"given":"Huang","family":"Guoyan","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066000, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, 066000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7159-1424","authenticated-orcid":true,"given":"Wang","family":"Qian","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066000, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, 066000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6828-1692","authenticated-orcid":true,"given":"Liu","family":"Xinqian","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066000, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, 066000, China"}]},{"given":"Hao","family":"Xiaobing","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Yanshan University, Qinhuangdao, Hebei 066000, China"},{"name":"Computer Virtual Technology and System Integration Laboratory of Hebei Province, 066000, China"}]},{"given":"Yan","family":"Huaizhi","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Software Security Engineering Technique, School of computer Science and Technology, 5 South Zhongguancun Street, Haidian District, Beijing 100081, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1016\/j.procs.2016.08.243","volume":"96","year":"2016","journal-title":"Procedia Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.30"},{"issue":"2","key":"3","first-page":"59","volume":"14","year":"2014","journal-title":"Global Journal of Computer Science and Technology"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183115501016"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183114500193"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03934"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.014"},{"key":"8","first-page":"1","volume":"14","year":"2003","journal-title":"Dynamics of Continuous Discrete & Impulsive Systems"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.046116"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1142\/S0219525914500064"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-010-9399-9"},{"first-page":"156","volume-title":"The structure and the volatility of the software","year":"2008","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.5468"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04397"},{"issue":"12","key":"21","first-page":"3263","volume":"9","year":"2015","journal-title":"ICIC Express Letters"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"issue":"8","key":"23","first-page":"3059","volume":"11","year":"2015","journal-title":"Journal of Computational Information Systems"},{"journal-title":"Icic Express Letters Part B Applications An International Journal of Research and Surveys","first-page":"7","year":"2016","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2006.874920"},{"issue":"4","key":"27","first-page":"81","volume":"27","year":"2003","journal-title":"Acm Sigsoft Software Engineering Notes"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/7140480.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/7140480.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/7140480.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:35:15Z","timestamp":1551983715000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/7140480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,7]]},"references-count":23,"alternative-id":["7140480","7140480"],"URL":"https:\/\/doi.org\/10.1155\/2019\/7140480","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,3,7]]}}}