Empirical studies on the impact of filter-based ranking feature selection on security vulnerability prediction
暂无分享,去创建一个
Xiaolin Ju | Zhanqi Cui | Xiang Chen | Zhidan Yuan | Dun Zhang | Zhanqi Cui | Xiang Chen | Xiaolin Ju | Dun Zhang | Zhidan Yuan
[1] Qing Gu,et al. DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy , 2019, Journal of Computer Science and Technology.
[2] Yong Li,et al. Evaluating Data Filter on Cross-Project Defect Prediction: Comparison and Improvements , 2017, IEEE Access.
[3] Meng Liu,et al. Do different cross‐project defect prediction methods identify the same defective modules? , 2019, J. Softw. Evol. Process..
[4] Hamid Reza Shahriari,et al. Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques , 2017, ACM Comput. Surv..
[5] Xiang Chen,et al. Software defect number prediction: Unsupervised vs supervised methods , 2019, Inf. Softw. Technol..
[6] Y. Benjamini,et al. Controlling the false discovery rate: a practical and powerful approach to multiple testing , 1995 .
[7] David Lo,et al. Combining Software Metrics and Text Features for Vulnerable File Prediction , 2015, 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS).
[8] Wouter Joosen,et al. Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.
[9] Laurie A. Williams,et al. Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.
[10] Yuxiang Shen,et al. An empirical study on pareto based multi-objective feature selection for software defect prediction , 2019, J. Syst. Softw..
[11] Hao Li,et al. DeepCPDP: Deep Learning Based Cross-Project Defect Prediction , 2019, IEEE Access.
[12] Xiang Chen,et al. A Two-Stage Data Preprocessing Approach for Software Fault Prediction , 2014, 2014 Eighth International Conference on Software Security and Reliability.
[13] Thomas G. Dietterich. Approximate Statistical Tests for Comparing Supervised Classification Learning Algorithms , 1998, Neural Computation.
[14] Tim Menzies,et al. Revisiting unsupervised learning for defect prediction , 2017, ESEC/SIGSOFT FSE.
[15] Tao Zhang,et al. HDA: Cross-Project Defect Prediction via Heterogeneous Domain Adaptation With Dictionary Learning , 2018, IEEE Access.
[16] Zhanqi Cui,et al. ALTRA: Cross-Project Software Defect Prediction via Active Learning and Tradaboost , 2020, IEEE Access.
[17] Kewei Cheng,et al. Feature Selection , 2016, ACM Comput. Surv..
[18] Laurie A. Williams,et al. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[19] Gary McGraw,et al. Software Security Testing , 2004, IEEE Secur. Priv..
[20] Enio G. Jelihovschi,et al. ScottKnott: A Package for Performing the Scott-Knott Clustering Algorithm in R , 2014 .
[21] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[22] Yuming Zhou,et al. Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models , 2016, SIGSOFT FSE.
[23] Xiang Chen,et al. Multitask defect prediction , 2019, J. Softw. Evol. Process..
[24] Shane McIntosh,et al. Automated Parameter Optimization of Classification Techniques for Defect Prediction Models , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[25] Jin Liu,et al. The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).
[26] Igor Kononenko,et al. Estimating Attributes: Analysis and Extensions of RELIEF , 1994, ECML.
[27] Laurie A. Williams,et al. Strengthening the empirical analysis of the relationship between Linus' Law and software security , 2010, ESEM '10.
[28] Huan Liu,et al. Chi2: feature selection and discretization of numeric attributes , 1995, Proceedings of 7th IEEE International Conference on Tools with Artificial Intelligence.
[29] Xin Yao,et al. A Survey on Evolutionary Computation Approaches to Feature Selection , 2016, IEEE Transactions on Evolutionary Computation.
[30] Yasutaka Kamei,et al. Defect Prediction: Accomplishments and Future Challenges , 2016, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[31] Kemal Polat,et al. A new feature selection method on classification of medical datasets: Kernel F-score feature selection , 2009, Expert Syst. Appl..
[32] Tracy Hall,et al. A Systematic Literature Review on Fault Prediction Performance in Software Engineering , 2012, IEEE Transactions on Software Engineering.
[33] Riccardo Scandariato,et al. Predicting Vulnerable Components: Software Metrics vs Text Mining , 2014, 2014 IEEE 25th International Symposium on Software Reliability Engineering.
[34] Shane McIntosh,et al. Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[35] Shujuan Jiang,et al. An Empirical Study on the Effectiveness of Feature Selection for Cross-Project Defect Prediction , 2019, IEEE Access.
[36] Shane McIntosh,et al. A Large-Scale Study of the Impact of Feature Selection Techniques on Defect Classification Models , 2017, 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR).
[37] Premkumar T. Devanbu,et al. How, and why, process metrics are better , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[38] Daoxu Chen,et al. A Cluster Based Feature Selection Method for Cross-Project Software Defect Prediction , 2017, Journal of Computer Science and Technology.
[39] Taghi M. Khoshgoftaar,et al. Choosing software metrics for defect prediction: an investigation on feature selection techniques , 2011, Softw. Pract. Exp..
[40] F. Wilcoxon. Individual Comparisons by Ranking Methods , 1945 .
[41] Yuming Zhou,et al. Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware Perspective , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.
[42] Zan Wang,et al. Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods , 2020, IEEE Transactions on Reliability.
[43] Riccardo Scandariato,et al. The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models , 2017, IEEE Transactions on Reliability.
[44] Xiang Chen,et al. FECAR: A Feature Selection Framework for Software Defect Prediction , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[45] J. A. Ferreira,et al. On the Benjamini-Hochberg method , 2006, math/0611265.
[46] Wouter Joosen,et al. Software vulnerability prediction using text analysis techniques , 2012, MetriSec '12.
[47] Xiang Chen,et al. MULTI: Multi-objective effort-aware just-in-time software defect prediction , 2018, Inf. Softw. Technol..