{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:46Z","timestamp":1740149026211,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"],"award-info":[{"award-number":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"],"award-info":[{"award-number":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Defense Industrial Technology Development Program","award":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"],"award-info":[{"award-number":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"]}]},{"name":"Open Project Program of the State Key Lab of CAD&CG","award":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"],"award-info":[{"award-number":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"]}]},{"DOI":"10.13039\/501100004835","name":"Zhejiang University","doi-asserted-by":"publisher","award":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"],"award-info":[{"award-number":["LY20F020015","LY21F020015","61702517","61972121","61902345","61772525","JCKY2019415C001","2109"]}],"id":[{"id":"10.13039\/501100004835","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,24]]},"abstract":"<jats:p>As the scale and complexity of software increase, software security issues have become the focus of society. Software defect prediction (SDP) is an important means to assist developers in discovering and repairing potential defects that may endanger software security in advance and improving software security and reliability. Currently, cross-project defect prediction (CPDP) and cross-company defect prediction (CCDP) are widely studied to improve the defect prediction performance, but there are still problems such as inconsistent metrics and large differences in data distribution between source and target projects. Therefore, a new CCDP method based on metric matching and sample weight setting is proposed in this study. First, a clustering-based metric matching method is proposed. The multigranularity metric feature vector is extracted to unify the metric dimension while maximally retaining the information contained in the metrics. Then use metric clustering to eliminate metric redundancy and extract representative metrics through principal component analysis (PCA) to support one-to-one metric matching. This strategy not only solves the metric inconsistent and redundancy problem but also transforms the cross-company heterogeneous defect prediction problem into a homogeneous problem. Second, a sample weight setting method is proposed to transform the source data distribution. Wherein the statistical source sample frequency information is set as an impact factor to increase the weight of source samples that are more similar to the target samples, which improves the data distribution similarity between the source and target projects, thereby building a more accurate prediction model. Finally, after the above two-step processing, some classical machine learning methods are applied to build the prediction model, and 12 project datasets in NASA and PROMISE are used for performance comparison. Experimental results prove that the proposed method has superior prediction performance over other mainstream CCDP methods.<\/jats:p>","DOI":"10.1155\/2021\/5558561","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T17:57:36Z","timestamp":1629827856000},"page":"1-19","source":"Crossref","is-referenced-by-count":4,"title":["Research on Cross-Company Defect Prediction Method to Improve Software Security"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3238-5430","authenticated-orcid":true,"given":"Yanli","family":"Shao","sequence":"first","affiliation":[{"name":"Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jingru","family":"Zhao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xingqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weiwei","family":"Wu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3560-4926","authenticated-orcid":true,"given":"Jinglong","family":"Fang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.027"},{"key":"2","first-page":"792","article-title":"Boosting-based k-NN learning for software defect prediction","volume":"25","author":"L. He","year":"2012","journal-title":"Moshi Shibie yu Rengong Zhineng\/Pattern Recognition and Artificial Intelligence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110402"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113085"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.03.076"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01246-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2724538"},{"article-title":"Cross-project defect prediction: a large scale experiment on data vs. domain vs. process","author":"T. Zimmermann","key":"10","doi-asserted-by":"crossref","DOI":"10.1145\/1595696.1595713"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2013.6606589"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.2010.2091281"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2013.6606584"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.11.005"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.12.091"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106940"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114637"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2007.256941"},{"first-page":"426","article-title":"FECAR\uff1aA feature selection framework for software defect prediction","author":"S. L. Liu","key":"19"},{"volume-title":"Feature Selection and Clustering in Software Quality Prediction","year":"2007","author":"Q Wang","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2012.2226152"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2597849"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/msr.2013.6624057"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786813"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2016EDL8238"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2720603"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.06.070"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.2307\/3172855"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.014"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2002.1019484"},{"volume-title":"Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval","year":"1998","author":"D. Lewis","key":"33"},{"article-title":"Using faults-slip-through metric as a predictor of fault-proneness","author":"W. Afzal","key":"34","doi-asserted-by":"crossref","DOI":"10.1109\/APSEC.2010.54"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.031"},{"article-title":"Variance analysis in software fault prediction models","author":"Y. Jiang","key":"36","doi-asserted-by":"crossref","DOI":"10.1109\/ISSRE.2009.13"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2013.11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"39","unstructured":"ChowdhuryI.ZulkernineM.Using Complexity, Coupling, and Cohesion Metrics as Early Indicators of VulnerabilitiesKingston, CanadaQueen\u2019s UniversityDoctoral dissertation"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(13)70045-9"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5558561.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5558561.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5558561.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T17:57:48Z","timestamp":1629827868000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5558561\/"}},"subtitle":[],"editor":[{"given":"Honghao","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":40,"alternative-id":["5558561","5558561"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5558561","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,8,24]]}}}