{"id":"https://openalex.org/W3184664118","doi":"https://doi.org/10.5220/0010558501850195","title":"Improving Vulnerability Prediction of JavaScript Functions using Process Metrics","display_name":"Improving Vulnerability Prediction of JavaScript Functions using Process Metrics","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3184664118","doi":"https://doi.org/10.5220/0010558501850195","mag":"3184664118"},"language":"en","primary_location":{"id":"doi:10.5220/0010558501850195","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010558501850195","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Software Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0010558501850195","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103132138","display_name":"Tam\u00e1s Viszkok","orcid":"https://orcid.org/0000-0002-6049-786X"},"institutions":[{"id":"https://openalex.org/I227486990","display_name":"University of Szeged","ror":"https://ror.org/01pnej532","country_code":"HU","type":"education","lineage":["https://openalex.org/I227486990"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Tam\u00e1s Viszkok","raw_affiliation_strings":["Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---","institution_ids":["https://openalex.org/I227486990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021558521","display_name":"P\u00e9ter Heged\u0171s","orcid":"https://orcid.org/0000-0003-4592-6504"},"institutions":[{"id":"https://openalex.org/I4210152167","display_name":"MTA-SZTE Research Group on Artificial Intelligence","ror":"https://ror.org/0507fk326","country_code":"HU","type":"facility","lineage":["https://openalex.org/I227486990","https://openalex.org/I4210152167","https://openalex.org/I7597260"]},{"id":"https://openalex.org/I227486990","display_name":"University of Szeged","ror":"https://ror.org/01pnej532","country_code":"HU","type":"education","lineage":["https://openalex.org/I227486990"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"P\u00e9ter Heged\u0171s","raw_affiliation_strings":["Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---","MTA-SZTE Research Group on Artificial Intelligence, ELKH, Tisza Lajos krt. 103, Szeged, Hungary, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---","institution_ids":["https://openalex.org/I227486990"]},{"raw_affiliation_string":"MTA-SZTE Research Group on Artificial Intelligence, ELKH, Tisza Lajos krt. 103, Szeged, Hungary, --- Select a Country ---","institution_ids":["https://openalex.org/I4210152167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019664412","display_name":"Rudolf Feren\u0107","orcid":"https://orcid.org/0000-0001-8897-7403"},"institutions":[{"id":"https://openalex.org/I227486990","display_name":"University of Szeged","ror":"https://ror.org/01pnej532","country_code":"HU","type":"education","lineage":["https://openalex.org/I227486990"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"Rudolf Ferenc","raw_affiliation_strings":["Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---","FrontEndART Ltd., Somogyi utca 19., Szeged, Hungary, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Szeged, Dugonics t\u00e9r 13, Szeged, Hungary, --- Select a Country ---","institution_ids":["https://openalex.org/I227486990"]},{"raw_affiliation_string":"FrontEndART Ltd., Somogyi utca 19., Szeged, Hungary, --- Select a Country ---","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103132138"],"corresponding_institution_ids":["https://openalex.org/I227486990"],"apc_list":null,"apc_paid":null,"fwci":0.5508,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72201625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"185","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8514754772186279},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.8438791036605835},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6936555504798889},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6245614886283875},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5862367153167725},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5479434132575989},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.48719877004623413},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45616087317466736},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.42816779017448425},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42151764035224915},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41893577575683594},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.35806629061698914},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31281614303588867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28669804334640503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8514754772186279},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.8438791036605835},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6936555504798889},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6245614886283875},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5862367153167725},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5479434132575989},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.48719877004623413},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45616087317466736},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42816779017448425},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42151764035224915},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41893577575683594},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35806629061698914},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31281614303588867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28669804334640503},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0010558501850195","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010558501850195","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Software Technologies","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0010558501850195","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0010558501850195","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Software Technologies","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2461078469","https://openalex.org/W123790205","https://openalex.org/W2085515337","https://openalex.org/W3087706721","https://openalex.org/W4287664162","https://openalex.org/W3102852402","https://openalex.org/W827014118","https://openalex.org/W4385695489","https://openalex.org/W2498635018","https://openalex.org/W3081644756"],"abstract_inverted_index":{"Due":[0],"to":[1,13,17,26,48,78,124,193,203,215],"the":[2,18,28,31,51,94,105,113,140,143,148,157,160,174],"growing":[3],"number":[4,133],"of":[5,20,61,75,107,134,142,150,159,177,189,199,211],"cyber":[6],"attacks":[7],"against":[8],"computer":[9],"systems,":[10],"we":[11,122,182],"need":[12],"pay":[14],"special":[15],"attention":[16],"security":[19],"our":[21,55],"software":[22],"systems.":[23],"In":[24,119],"order":[25],"maximize":[27],"effectiveness,":[29],"excluding":[30],"human":[32],"component":[33],"from":[34],"this":[35,46,120],"process":[36,128,170],"would":[37],"be":[38,79],"a":[39,59,72,82,137,184,206],"huge":[40],"breakthrough.":[41],"The":[42],"first":[43],"step":[44],"towards":[45],"is":[47],"automatically":[49],"recognize":[50],"vulnerable":[52],"parts":[53],"in":[54,101,109,187,197,209],"code.":[56],"Researchers":[57],"put":[58],"lot":[60],"effort":[62],"into":[63,147],"creating":[64],"machine":[65],"learning":[66],"models":[67],"that":[68,169],"could":[69],"determine":[70],"if":[71],"given":[73],"piece":[74],"code,":[76],"or":[77,88,139],"more":[80],"precise,":[81],"selected":[83],"function,":[84],"contains":[85],"any":[86],"vulnerabilities":[87,103],"not.":[89],"We":[90,166],"aim":[91],"at":[92,104],"improving":[93],"existing":[95],"models,":[96],"building":[97],"on":[98],"previous":[99],"results":[100],"predicting":[102],"level":[106],"functions":[108],"JavaScript":[110,162],"code":[111,117,131],"using":[112],"well-known":[114],"static":[115],"source":[116,145],"metrics.":[118],"work,":[121],"propose":[123],"include":[125],"several":[126],"so-called":[127],"metrics":[129,171],"(e.g.,":[130],"churn,":[132],"developers":[135],"modifying":[136],"file,":[138],"age":[141],"changed":[144],"code)":[146],"set":[149],"features,":[151],"and":[152,205],"examine":[153],"how":[154],"they":[155],"affect":[156],"performance":[158],"function-level":[161],"vulnerability":[163],"prediction":[164,175],"models.":[165,179],"can":[167],"confirm":[168],"significantly":[172],"improve":[173],"power":[176],"such":[178],"On":[180],"average,":[181],"observed":[183],"8.4%":[185],"improvement":[186,196,208],"terms":[188,198,210],"F-measure":[190],"(from":[191,201,213],"0.764":[192],"0.848),":[194],"3.5%":[195],"precision":[200],"0.953":[202],"0.988)":[204],"6.3%":[207],"recall":[212],"0.697":[214],"0.760).":[216]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
