A comparative study of class rebalancing methods for security bug report classification
Identifying security bug reports (SBRs) accurately from a bug repository can reduce a
software product's security risk. However, the class imbalance problem exists for SBR …
software product's security risk. However, the class imbalance problem exists for SBR …
Gang of eight: A defect taxonomy for infrastructure as code scripts
Defects in infrastructure as code (IaC) scripts can have serious consequences, for example,
creating large-scale system outages. A taxonomy of IaC defects can be useful for …
creating large-scale system outages. A taxonomy of IaC defects can be useful for …
The impact factors on the performance of machine learning-based vulnerability detection: A comparative study
Abstract Machine learning-based Vulnerability detection is an active research topic in
software security. Different traditional machine learning-based and deep learning-based …
software security. Different traditional machine learning-based and deep learning-based …
Tandem: A taxonomy and a dataset of real-world performance bugs
The detection of performance bugs, like those causing an unexpected execution time, has
gained much attention in the last years due to their potential impact in safety-critical and …
gained much attention in the last years due to their potential impact in safety-critical and …
Deep learning-based software bug classification
Context: Accurate classification of bugs can help accelerate the bug triage process, code
inspection, and repair activities. In this context, many machine learning techniques have …
inspection, and repair activities. In this context, many machine learning techniques have …
CVE-assisted large-scale security bug report dataset construction method
Identifying SBRs (security bug reports) is crucial for eliminating security issues during
software development. Machine learning are promising ways for SBR prediction. However …
software development. Machine learning are promising ways for SBR prediction. However …
State reconciliation defects in infrastructure as code
In infrastructure as code (IaC), state reconciliation is the process of querying and comparing
the infrastructure state prior to changing the infrastructure. As state reconciliation is pivotal to …
the infrastructure state prior to changing the infrastructure. As state reconciliation is pivotal to …
Duplicate bug report detection using named entity recognition
Software bugs pose significant challenges in management. The Bug Tracking System (BTS)
serves as a standard platform to chronicle, oversee, and manage bugs throughout software …
serves as a standard platform to chronicle, oversee, and manage bugs throughout software …
[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …
combinations of events and interactions among hardware and software components. These …
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
A Arabat, M Sayagh - Empirical Software Engineering, 2024 - Springer
Modern software systems are composed of several loosely coupled components. Typical
examples of such systems are plugin-based systems, microservices, and modular software …
examples of such systems are plugin-based systems, microservices, and modular software …