{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:47:55Z","timestamp":1774540075080,"version":"3.50.1"},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1016\/j.jss.2016.02.048","type":"journal-article","created":{"date-parts":[[2016,3,5]],"date-time":"2016-03-05T22:49:31Z","timestamp":1457218171000},"page":"218-228","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":40,"special_numbering":"C","title":["Mining trends and patterns of software vulnerabilities"],"prefix":"10.1016","volume":"117","author":[{"given":"Syed Shariyar","family":"Murtaza","sequence":"first","affiliation":[]},{"given":"Wael","family":"Khreich","sequence":"additional","affiliation":[]},{"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[]},{"given":"Ayse Basar","family":"Bener","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2016.02.048_bib0001","unstructured":"Barlowe, B., Blackbird, J., et al. The Evolution of Malware and the Threat Landscape\u2014a 10 Year Review, Microsoft Security Intelligence Report: Special Edition, 2012. Available online: download.microsoft.com."},{"issue":"13","key":"10.1016\/j.jss.2016.02.048_bib0002","first-page":"1382","article-title":"A Hassan, Ahmed E., H. What are developers talking about? An analysis of topics and trends in Stack Overflow","volume":"9","author":"Barua","year":"2014","journal-title":"Journal of Empirical Softw. Eng."},{"key":"10.1016\/j.jss.2016.02.048_bib0003","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.jss.2016.02.048_bib0004","unstructured":"Check Point Ltd., 2015 Security Report, Check Point Technologies Ltd., June 2015 [Online]: https:\/\/www.checkpoint.com\/resources\/2015securityreport\/."},{"key":"10.1016\/j.jss.2016.02.048_bib0005","unstructured":"Christey, S. Martin, R. A 2007 report on vulnerability type distribution in CVE, 2007, Available online at: http:\/\/cwe.mitre.org\/documents\/vuln-trends.html."},{"issue":"1\u20132","key":"10.1016\/j.jss.2016.02.048_bib0006","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1093\/biomet\/42.1-2.80","article-title":"Some quick sign tests for trend in location and dispersion","volume":"42","author":"Cox","year":"1955","journal-title":"Biometrika"},{"key":"10.1016\/j.jss.2016.02.048_bib0007","series-title":"Proceedings of the 2006 SIGCOMM Workshop on Large-scale attack defense (LSAD)","first-page":"131","article-title":"Large-scale vulnerability analysis","author":"Frei","year":"2006"},{"key":"10.1016\/j.jss.2016.02.048_bib0008","series-title":"Proceedings of the 4th International Conference on Availability, Reliability and Security","first-page":"718","article-title":"Estimating ToE risk level using CVSS","author":"Houmb","year":"2009"},{"issue":"8","key":"10.1016\/j.jss.2016.02.048_bib0009","doi-asserted-by":"crossref","first-page":"2732","DOI":"10.1016\/j.patcog.2010.03.006","article-title":"Iterative Boolean combination of classifiers in the ROC space: an application to anomaly detection with HMMs","volume":"43","author":"Khreich","year":"2010","journal-title":"Pattern Recogn. J."},{"key":"10.1016\/j.jss.2016.02.048_bib0010","series-title":"Proceedings of the 14th International Working Conference on Source Code Analysis and Manipulatino, 2014","first-page":"83","article-title":"TotalADS: automated software anomaly detection system","author":"Murtaza","year":"2014"},{"key":"10.1016\/j.jss.2016.02.048_bib0011","series-title":"Proceedings of 24th International Symposium on Software Reliability Engineering (ISSRE)","first-page":"431","article-title":"A host-based anomaly detection approach by representing system calls as states of kernel modules","author":"Murtaza","year":"2013"},{"key":"10.1016\/j.jss.2016.02.048_bib0012","series-title":"Proceedings of the 21st International Symposium on Software Reliability Engineering (ISSRE)","first-page":"120","article-title":"Security trend analysis with CVE topic models","volume":"111","author":"Neuhaus","year":"2010"},{"key":"10.1016\/j.jss.2016.02.048_bib0013","first-page":"7","volume":"39","author":"Rozenfeld","year":"2015"},{"key":"10.1016\/j.jss.2016.02.048_bib0014","series-title":"An Introduction to Markov Processes","author":"Stroock","year":"2005"},{"key":"10.1016\/j.jss.2016.02.048_bib0015","volume":"19","author":"Symantec 2013 trends","year":"2014"},{"key":"10.1016\/j.jss.2016.02.048_bib0016","series-title":"Proceedings of IEEE Congress on Evolutionary Computation","first-page":"440","article-title":"Information gain based dimensionality selection for classifying text documents","author":"Wijayasekara","year":"2013"},{"key":"10.1016\/j.jss.2016.02.048_bib0017","series-title":"Proceedings of 40th Annual Conference of the IEEE Industrial Electronics Society","first-page":"3612","article-title":"Vulnerability identification and classification via text mining bug databases","author":"Wijayasekara","year":"2014"},{"key":"10.1016\/j.jss.2016.02.048_bib0018","series-title":"Proceedings of the 5th International. Conference on Human System Interaction, 2012","article-title":"Mining bug databases for unidentified software vulnerabilities","author":"Wijayasekara","year":"2012"},{"key":"10.1016\/j.jss.2016.02.048_bib0019","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2005"},{"key":"10.1016\/j.jss.2016.02.048_bib0020","series-title":"Experimentation in Software Engineering: An Introduction","author":"Wohlin","year":"2002"},{"key":"10.1016\/j.jss.2016.02.048_bib0021","series-title":"Proceedings of the 8th Working Conference on Mining Software Repositories","first-page":"93","article-title":"Security versus performance bugs: a case study on Firefox","author":"Zaman","year":"2011"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216000790?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216000790?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T05:13:37Z","timestamp":1572671617000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121216000790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":21,"alternative-id":["S0164121216000790"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2016.02.048","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2016,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mining trends and patterns of software vulnerabilities","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2016.02.048","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}