{"id":"https://openalex.org/W4413126840","doi":"https://doi.org/10.1007/s10664-025-10644-y","title":"Information-theoretic detection of unusual source code changes","display_name":"Information-theoretic detection of unusual source code changes","publication_year":2025,"publication_date":"2025-08-08","ids":{"openalex":"https://openalex.org/W4413126840","doi":"https://doi.org/10.1007/s10664-025-10644-y"},"language":"en","primary_location":{"id":"doi:10.1007/s10664-025-10644-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10644-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10644-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10644-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078465653","display_name":"Adriano Torres","orcid":"https://orcid.org/0000-0003-3754-029X"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"The University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Adriano Torres","raw_affiliation_strings":["School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer and Mathematical Sciences, University of Adelaide, Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033132966","display_name":"Sebastian Baltes","orcid":null},"institutions":[{"id":"https://openalex.org/I54009628","display_name":"University of Bayreuth","ror":"https://ror.org/0234wmv40","country_code":"DE","type":"education","lineage":["https://openalex.org/I54009628"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Baltes","raw_affiliation_strings":["Software Engineering Group, University of Bayreuth, Bayreuth, Germany"],"affiliations":[{"raw_affiliation_string":"Software Engineering Group, University of Bayreuth, Bayreuth, Germany","institution_ids":["https://openalex.org/I54009628"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077658936","display_name":"Christoph Treude","orcid":"https://orcid.org/0000-0002-6919-2149"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Christoph Treude","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056886268","display_name":"Markus Wagner","orcid":"https://orcid.org/0000-0002-3124-0061"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Markus Wagner","raw_affiliation_strings":["Department of Data Science and AI, Monash University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Data Science and AI, Monash University, Melbourne, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078465653"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":1.4346,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83703475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"30","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5998615026473999},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5878227353096008},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41820862889289856},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.28503501415252686}],"concepts":[{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5998615026473999},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5878227353096008},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41820862889289856},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28503501415252686},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10664-025-10644-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10644-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10644-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:publications/bc7e76aa-829a-483f-81a6-b9e47feb05cf","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/bc7e76aa-829a-483f-81a6-b9e47feb05cf","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Torres, A, Baltes, S, Treude, C & Wagner, M 2025, 'Information-theoretic detection of unusual source code changes', Empirical Software Engineering, vol. 30, no. 5, 153. https://doi.org/10.1007/s10664-025-10644-y","raw_type":"article"},{"id":"pmh:doi:10.15495/epub_ubt_00008932","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-11506","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/10504","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1007/s10664-025-10644-y","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1007/s10664-025-10644-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10664-025-10644-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10664-025-10644-y.pdf","source":{"id":"https://openalex.org/S109852484","display_name":"Empirical Software Engineering","issn_l":"1382-3256","issn":["1382-3256","1573-7616"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Empirical Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413126840.pdf","grobid_xml":"https://content.openalex.org/works/W4413126840.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W76990466","https://openalex.org/W1480376833","https://openalex.org/W1491178396","https://openalex.org/W1964962870","https://openalex.org/W1966184253","https://openalex.org/W1969657187","https://openalex.org/W1985236007","https://openalex.org/W1987681444","https://openalex.org/W1988051129","https://openalex.org/W1990730390","https://openalex.org/W1991604845","https://openalex.org/W1995875735","https://openalex.org/W1997502136","https://openalex.org/W1997941062","https://openalex.org/W2024880014","https://openalex.org/W2028051941","https://openalex.org/W2032843080","https://openalex.org/W2037237437","https://openalex.org/W2044422867","https://openalex.org/W2044802063","https://openalex.org/W2045749853","https://openalex.org/W2079937233","https://openalex.org/W2106956101","https://openalex.org/W2110542691","https://openalex.org/W2130332717","https://openalex.org/W2149411963","https://openalex.org/W2150294586","https://openalex.org/W2158744032","https://openalex.org/W2159945724","https://openalex.org/W2160709761","https://openalex.org/W2164777277","https://openalex.org/W2344444819","https://openalex.org/W2403231226","https://openalex.org/W2477907264","https://openalex.org/W2514084604","https://openalex.org/W2795516572","https://openalex.org/W2810607235","https://openalex.org/W2883311143","https://openalex.org/W2899407111","https://openalex.org/W2962946042","https://openalex.org/W3006568433","https://openalex.org/W3173543662","https://openalex.org/W4248123122","https://openalex.org/W4292157289","https://openalex.org/W4312782983","https://openalex.org/W4323655724","https://openalex.org/W4385270060"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W3081644756"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"code":[2,52,125,159,177],"base":[3],"of":[4,28,35,45,49,53,66,70,83,100,103,123,135,146,175],"software":[5],"projects":[6,55],"evolves":[7],"essentially":[8],"through":[9],"inserting":[10],"and":[11,15,73,85,120,127,166],"removing":[12],"information":[13,47],"to":[14,149,172,187],"from":[16,56,78],"the":[17,26,32,36,43,46,50,64,97,101,112,168,181],"source":[18,51,108,158,176],"code.":[19,37],"We":[20,88,110],"can":[21],"measure":[22],"this":[23,39],"evolution":[24,98],"via":[25],"elements":[27],"infor-mation\u2014tokens,":[29],"words,":[30],"nodes\u2014of":[31],"respective":[33],"representation":[34],"In":[38],"work,":[40],"we":[41,80,95,141],"approach":[42,153,186],"measurement":[44,174],"content":[48],"open-source":[54],"an":[57,91],"information-theoretic":[58,173],"standpoint.":[59],"Our":[60],"focus":[61],"is":[62],"on":[63],"entropy":[65,102,118,130],"two":[67],"funda-mental":[68],"representations":[69],"code:":[71],"tokens":[72],"abstract":[74],"syntax":[75],"tree":[76],"nodes,":[77],"which":[79],"derive":[81],"definitions":[82],"textual":[84],"structural":[86],"entropy.":[87],"proceed":[89],"with":[90,162],"empirical":[92],"assessment":[93],"where":[94],"evaluate":[96],"patterns":[99],"95":[104],"actively":[105],"maintained":[106],"open":[107],"pro-jects.":[109],"calculate":[111],"statistical":[113],"relationships":[114],"between":[115],"our":[116,152],"derived":[117],"metrics":[119],"classic":[121,138],"methods":[122],"measuring":[124],"complexity":[126,136,191],"learn":[128],"that":[129,151],"may":[131,154],"capture":[132],"different":[133],"dimen-sions":[134],"than":[137],"metrics.":[139],"Finally,":[140],"conduct":[142],"entropy-based":[143],"anomaly":[144],"detection":[145],"unusual":[147,157],"changes":[148],"demonstrate":[150],"effectively":[155],"recognise":[156],"change":[160],"events":[161],"over":[163],"60%":[164],"precision,":[165],"lay":[167],"groundwork":[169],"for":[170,183],"improvements":[171],"evolution,":[178],"thus":[179],"paving":[180],"way":[182],"a":[184],"new":[185],"statically":[188],"gauging":[189],"program":[190],"throughout":[192],"its":[193],"development.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
