{"id":"https://openalex.org/W4206787101","doi":"https://doi.org/10.1109/bigdata52589.2021.9671757","title":"Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding","display_name":"Mining Learner-friendly Security Patterns from Huge Published Histories of Software Applications for an Intelligent Tutoring System in Secure Coding","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4206787101","doi":"https://doi.org/10.1109/bigdata52589.2021.9671757"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata52589.2021.9671757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671757","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059057746","display_name":"Sayem Mohammad Imtiaz","orcid":"https://orcid.org/0000-0002-0357-0098"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sayem Mohammad Imtiaz","raw_affiliation_strings":["Iowa State University, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, IA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035247633","display_name":"Kazi Zakia Sultana","orcid":"https://orcid.org/0000-0002-0609-5800"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kazi Zakia Sultana","raw_affiliation_strings":["Iowa State University, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, IA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090253347","display_name":"Aparna S. Varde","orcid":"https://orcid.org/0000-0002-3170-2510"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aparna S. Varde","raw_affiliation_strings":["Iowa State University, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University, IA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059057746"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.3442,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59017497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"4869","last_page":"4876"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.8572018146514893},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7446053624153137},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6061888933181763},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5443649888038635},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.5312991142272949},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49079379439353943},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.47335219383239746},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.4501695930957794},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.424807608127594},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4115489423274994},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3845834732055664},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24238353967666626},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.1844785213470459},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.10428828001022339}],"concepts":[{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.8572018146514893},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7446053624153137},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6061888933181763},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5443649888038635},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.5312991142272949},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49079379439353943},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.47335219383239746},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.4501695930957794},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.424807608127594},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4115489423274994},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3845834732055664},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24238353967666626},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.1844785213470459},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.10428828001022339},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata52589.2021.9671757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata52589.2021.9671757","pdf_url":null,"source":{"id":"https://openalex.org/S4363607718","display_name":"2021 IEEE International Conference on Big Data (Big Data)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.44999998807907104,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W178558608","https://openalex.org/W1506285740","https://openalex.org/W1526198568","https://openalex.org/W1554618854","https://openalex.org/W1582234216","https://openalex.org/W1790027761","https://openalex.org/W2022647735","https://openalex.org/W2023193572","https://openalex.org/W2044117262","https://openalex.org/W2057871674","https://openalex.org/W2058318920","https://openalex.org/W2067646586","https://openalex.org/W2079079970","https://openalex.org/W2084481113","https://openalex.org/W2113739228","https://openalex.org/W2131441032","https://openalex.org/W2134521102","https://openalex.org/W2138110817","https://openalex.org/W2160045272","https://openalex.org/W2246775628","https://openalex.org/W2261822585","https://openalex.org/W2296718798","https://openalex.org/W2313913955","https://openalex.org/W2397563017","https://openalex.org/W2508791575","https://openalex.org/W2518040442","https://openalex.org/W2524476898","https://openalex.org/W2754913139","https://openalex.org/W2767210280","https://openalex.org/W2786224651","https://openalex.org/W2914620743","https://openalex.org/W2964346542","https://openalex.org/W2995965185","https://openalex.org/W3007620842","https://openalex.org/W3114276237","https://openalex.org/W3179083649","https://openalex.org/W4242704521","https://openalex.org/W6607273956","https://openalex.org/W6630198464","https://openalex.org/W6679960114","https://openalex.org/W6727764404","https://openalex.org/W6987906808"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W23486959","https://openalex.org/W1588942021","https://openalex.org/W1981466760","https://openalex.org/W4225160120"],"abstract_inverted_index":{"Security":[0],"patterns":[1,25,50,68,86,208],"are":[2,239],"proven":[3],"solutions":[4],"to":[5,91,99,108,114,125,156,178,194],"recurring":[6],"problems":[7],"in":[8,119,144,181,185,222,241],"software":[9,16,55,59,123,128,145,190,224],"development.":[10,191],"The":[11],"growing":[12],"importance":[13],"of":[14,35,43,77,122,165,229],"secure":[15,104,182,189,223],"development":[17,56,225],"has":[18,62],"introduced":[19],"diverse":[20],"research":[21,44],"efforts":[22],"on":[23,29,103,203,218],"security":[24,49,60,129,207],"that":[26],"mostly":[27],"focused":[28],"classification":[30],"schemes,":[31],"evolution":[32],"and":[33,45,80,98,160,171,209,236,247],"evaluation":[34],"the":[36,75,85,120,166,204,227],"patterns.":[37,130],"Despite":[38],"a":[39,70,88,196],"huge":[40],"mature":[41],"history":[42],"popularity":[46],"among":[47],"researchers,":[48],"have":[51],"not":[52,63],"fully":[53],"penetrated":[54],"practices.":[57],"Besides,":[58],"education":[61],"been":[64],"benefited":[65],"by":[66],"these":[67],"though":[69],"commonly":[71],"stated":[72],"motivation":[73],"is":[74,83],"dissemination":[76],"expert":[78],"knowledge":[79,135],"experience.":[81],"This":[82],"because":[84],"lack":[87],"simple":[89],"embodiment":[90],"help":[92],"students":[93],"learn":[94],"about":[95],"vulnerable":[96],"code,":[97],"guide":[100],"new":[101],"developers":[102],"coding.":[105],"In":[106],"order":[107],"address":[109],"this":[110,231,242],"problem,":[111],"we":[112],"propose":[113,193],"conduct":[115],"intelligent":[116,198],"data":[117],"mining":[118,151,221],"context":[121],"engineering":[124],"discover":[126],"learner-friendly":[127,162,197],"Our":[131,233],"proposed":[132,215,234],"model":[133,216,235],"entails":[134],"discovery":[136,155],"from":[137],"large":[138],"scale":[139],"published":[140],"real-world":[141],"vulnerability":[142],"histories":[143],"applications.":[146],"We":[147,192,212],"harness":[148],"association":[149,219],"rule":[150,220],"for":[152],"frequent":[153],"pattern":[154],"mine":[157],"easily":[158],"comprehensible":[159],"explainable":[161],"rules,":[163],"mainly":[164],"type":[167,173],"\"flaw":[168],"implies":[169,174],"fix\"":[170],"\"attack":[172],"flaw\",":[175],"so":[176],"as":[177],"enhance":[179],"training":[180],"coding":[183],"which":[184],"turn":[186],"would":[187],"augment":[188],"build":[195],"tutoring":[199],"system":[200],"(ITS)":[201],"based":[202,217],"newly":[205],"discovered":[206],"rules":[210],"explored.":[211],"present":[213],"our":[214],"with":[226,245],"goal":[228],"building":[230],"ITS.":[232],"prototype":[237],"experiments":[238],"discussed":[240],"paper":[243],"along":[244],"challenges":[246],"ongoing":[248],"work.":[249]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
