{"id":"https://openalex.org/W6943984284","doi":"https://doi.org/10.17615/psrh-9g29","title":"Improving the Software Security Triaging and Remediation Processes using Hybrid Techniques along with Human-Readable Diagnoses","display_name":"Improving the Software Security Triaging and Remediation Processes using Hybrid Techniques along with Human-Readable Diagnoses","publication_year":2024,"publication_date":"2024-05-21","ids":{"openalex":"https://openalex.org/W6943984284","doi":"https://doi.org/10.17615/psrh-9g29"},"language":"en","primary_location":{"id":"doi:10.17615/psrh-9g29","is_oa":true,"landing_page_url":"https://doi.org/10.17615/psrh-9g29","pdf_url":null,"source":{"id":"https://openalex.org/S7407051488","display_name":"UNC Libraries","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"thesis"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.17615/psrh-9g29","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"James, Kedrian","orcid":null},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James, Kedrian","raw_affiliation_strings":["University of North Carolina at Chapel Hill"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Chapel Hill","institution_ids":["https://openalex.org/I114027177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I114027177"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.47755013,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4018999934196472,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4018999934196472,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.16850000619888306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.10700000077486038,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.6603000164031982},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.5875999927520752},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5795000195503235},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5498999953269958},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5296000242233276},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.38830000162124634},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.38690000772476196}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6927000284194946},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.6603000164031982},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.5875999927520752},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5795000195503235},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5498999953269958},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5296000242233276},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4578000009059906},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.38830000162124634},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.38690000772476196},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C534262118","wikidata":"https://www.wikidata.org/wiki/Q177719","display_name":"Medical diagnosis","level":2,"score":0.3781999945640564},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.375900000333786},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.35100001096725464},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.3422999978065491},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3292999863624573},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.3287000060081482},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32739999890327454},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.26589998602867126},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.2639000117778778}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17615/psrh-9g29","is_oa":true,"landing_page_url":"https://doi.org/10.17615/psrh-9g29","pdf_url":null,"source":{"id":"https://openalex.org/S7407051488","display_name":"UNC Libraries","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"doi:10.17615/psrh-9g29","is_oa":true,"landing_page_url":"https://doi.org/10.17615/psrh-9g29","pdf_url":null,"source":{"id":"https://openalex.org/S7407051488","display_name":"UNC Libraries","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"thesis"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5586628913879395,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Bug":[0],"triaging":[1,134],"entails":[2],"a":[3,62,81,100],"laborious":[4],"process":[5,45],"wherein":[6],"software":[7,35,133,177],"triagers":[8,49],"spend":[9],"time":[10],"examining":[11],"newly":[12],"submitted":[13],"bug":[14,51,59,120,185],"reports,":[15],"localizing":[16],"the":[17,23,31,44,78,92,103,108,126,161,194,209],"bugs,":[18],"and":[19,76,135,146,163,179,188,207],"assigning":[20],"them":[21],"to":[22,74,87,107,175],"appropriate":[24,202],"developer(s)":[25],"for":[26,48,138],"remediation.":[27,189],"In":[28,190],"recent":[29],"years,":[30],"adoption":[32],"of":[33,58,65,80,91,102,165,196],"automated":[34],"testing":[36,41],"techniques":[37,152],"such":[38],"as":[39],"fuzz":[40],"has":[42],"made":[43,143],"more":[46,144],"daunting":[47],"because":[50],"hunters":[52],"can":[53,141],"submit":[54],"an":[55],"overwhelming":[56],"number":[57],"reports":[60],"within":[61],"short":[63],"period":[64],"time.":[66],"Furthermore,":[67],"although":[68],"several":[69],"solutions":[70],"have":[71],"been":[72],"proposed":[73],"diagnose":[75],"locate":[77],"cause":[79,162],"security":[82,139,180],"bug,":[83],"modern":[84],"approaches":[85,116,174],"fail":[86],"provide":[88],"proper":[89],"explanations":[90],"discovered":[93,166],"flaws.":[94,167],"Moreover,":[95],"even":[96],"in":[97,153,182],"cases":[98],"where":[99],"description":[101],"flaw":[104],"is":[105],"provided":[106],"project":[109],"owner":[110],"or":[111],"vulnerability":[112],"disclosure":[113],"endpoint,":[114],"existing":[115],"do":[117],"not":[118],"employ":[119],"classification":[121,156],"models":[122],"that":[123,131,158],"precisely":[124],"describe":[125,160],"underlying":[127],"vulnerabilities.":[128],"I":[129,172,192],"posit":[130],"contemporary":[132],"remediation":[136],"strategies":[137],"bugs":[140],"be":[142],"accurate":[145],"efficient":[147],"by":[148,200],"using":[149,201],"crash":[150,183],"deduplication":[151],"conjunction":[154],"with":[155,211],"frameworks":[157],"succinctly":[159],"consequences":[164],"To":[168],"validate":[169],"this":[170],"thesis,":[171],"present":[173],"aid":[176],"developers":[178],"practitioners":[181],"deduplication,":[184],"diagnosis,":[186],"prioritization,":[187],"addition,":[191],"substantiate":[193],"effectiveness":[195],"each":[197],"approach":[198],"empirically":[199],"datasets,":[203],"conducting":[204],"real-world":[205],"evaluations,":[206],"comparing":[208],"results":[210],"state-of-the-art":[212],"techniques.":[213]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
