{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T20:31:28Z","timestamp":1720643488356},"reference-count":97,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004569","name":"Ministerstwo Edukacji i Nauki","doi-asserted-by":"publisher","award":["DWD\/5\/0178\/2021"],"id":[{"id":"10.13039\/501100004569","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.infsof.2023.107192","type":"journal-article","created":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T06:58:30Z","timestamp":1678258710000},"page":"107192","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Industrial applications of software defect prediction using machine learning: A business-driven systematic literature review"],"prefix":"10.1016","volume":"159","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3532-3876","authenticated-orcid":false,"given":"Szymon","family":"Stradowski","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3907-3357","authenticated-orcid":false,"given":"Lech","family":"Madeyski","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2023.107192_b1","first-page":"173","article-title":"Software defect prediction using supervised learning algorithm and unsupervised learning algorithm","author":"Dhall","year":"2013","journal-title":"IET Conference Publications"},{"issue":"7","key":"10.1016\/j.infsof.2023.107192_b2","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1162\/neco.1996.8.7.1341","article-title":"The lack of a priori distinctions between learning algorithms","volume":"8","author":"Wolpert","year":"1996","journal-title":"Neural Comput."},{"issue":"1","key":"10.1016\/j.infsof.2023.107192_b3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/4235.585893","article-title":"No free lunch theorems for optimization","volume":"1","author":"Wolpert","year":"1997","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.infsof.2023.107192_b4","article-title":"Exploring the challenges in software testing of the 5G system at Nokia: A survey","author":"Stradowski","year":"2022","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b5","article-title":"Machine learning in software defect prediction: A business-driven systematic mapping study","author":"Stradowski","year":"2023","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b6","series-title":"The Goal Question Metric Approach","author":"Basili","year":"1994"},{"issue":"4","key":"10.1016\/j.infsof.2023.107192_b7","doi-asserted-by":"crossref","first-page":"7346","DOI":"10.1016\/j.eswa.2008.10.027","article-title":"A systematic review of software fault prediction studies","volume":"36","author":"Catal","year":"2009","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"10.1016\/j.infsof.2023.107192_b8","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/TSE.2011.103","article-title":"A systematic literature review on fault prediction performance in software engineering","volume":"38","author":"Hall","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"10.1016\/j.infsof.2023.107192_b9","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TSE.2014.2322358","article-title":"Researcher bias: The use of machine learning in software defect prediction","volume":"40","author":"Shepperd","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b10","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","article-title":"A systematic review of machine learning techniques for software fault prediction","volume":"27","author":"Malhotra","year":"2015","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"10.1016\/j.infsof.2023.107192_b11","first-page":"1","article-title":"A systematic literature review of software defect prediction: Research trends, datasets, methods and frameworks","volume":"1","author":"Wahono","year":"2015","journal-title":"Journal of Software Engineering"},{"key":"10.1016\/j.infsof.2023.107192_b12","series-title":"2017 IEEE International Conference on Cybernetics and Computational Intelligence","first-page":"19","article-title":"Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset","author":"Meiliana","year":"2017"},{"issue":"3","key":"10.1016\/j.infsof.2023.107192_b13","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1109\/TR.2019.2892517","article-title":"Machine learning applied to software testing: A systematic mapping study","volume":"68","author":"Durelli","year":"2019","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.infsof.2023.107192_b14","doi-asserted-by":"crossref","first-page":"212","DOI":"10.3390\/sym11020212","article-title":"Empirical study of software defect prediction: A systematic mapping","volume":"11","author":"Son","year":"2019","journal-title":"Symmetry"},{"key":"10.1016\/j.infsof.2023.107192_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.104773","article-title":"A systematic literature review on software defect prediction using artificial intelligence: Datasets, data validation methods, approaches, and tools","volume":"111","author":"Pachouly","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"6","key":"10.1016\/j.infsof.2023.107192_b16","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MS.2016.156","article-title":"The tragedy of defect prediction, prince of empirical software engineering research","volume":"33","author":"Lanza","year":"2016","journal-title":"IEEE Softw."},{"issue":"5","key":"10.1016\/j.infsof.2023.107192_b17","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MS.2017.3641116","article-title":"Worlds apart - industrial and Academic Focus Areas in software testing","volume":"34","author":"Garousi","year":"2017","journal-title":"IEEE Softw."},{"issue":"2","key":"10.1016\/j.infsof.2023.107192_b18","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s11219-016-9353-3","article-title":"Software defect prediction: Do different classifiers find the same defects?","volume":"26","author":"Bowes","year":"2018","journal-title":"Softw. Qual. J."},{"issue":"3","key":"10.1016\/j.infsof.2023.107192_b19","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1049\/iet-sen.2017.0148","article-title":"Progress on approaches to software defect prediction","volume":"12","author":"Li","year":"2018","journal-title":"IET Softw."},{"issue":"160","key":"10.1016\/j.infsof.2023.107192_b20","article-title":"Machine learning: Algorithms, real-world applications and research directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"10.1016\/j.infsof.2023.107192_b21","series-title":"Evidence-Based Software Engineering and Systematic Reviews","author":"Kitchenham","year":"2016"},{"key":"10.1016\/j.infsof.2023.107192_b22","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2022.3174092","article-title":"SEGRESS: Software engineering guidelines for reporting secondary studies","author":"Kitchenham","year":"2023","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b23","series-title":"First International Symposium on Empirical Software Engineering and Measurement, Vol. 4","first-page":"513","article-title":"Developing search strategies for detecting relevant experiments","author":"Dieste","year":"2009"},{"key":"10.1016\/j.infsof.2023.107192_b24","series-title":"Data-Centric Business and Applications: Towards Software Development, Vol. 4","first-page":"137","article-title":"Code smell prediction employing machine learning meets emerging Java language constructs","author":"Grodzicka","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b25","series-title":"Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering","first-page":"1","article-title":"Guidelines for snowballing in systematic literature studies and a replication in software engineering","author":"Wohlin","year":"2014"},{"issue":"6","key":"10.1016\/j.infsof.2023.107192_b26","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.infsof.2010.12.010","article-title":"Identifying relevant studies in software engineering","volume":"53","author":"Zhang","year":"2011","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b27","series-title":"Developments in Information & Knowledge Management for Business Applications : Vol. 3","first-page":"285","article-title":"Code smells detection using artificial intelligence techniques: A business-driven systematic review","author":"Lewowski","year":"2022"},{"key":"10.1016\/j.infsof.2023.107192_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2014.01.002","article-title":"Considering rigor and relevance when evaluating test driven development: A systematic review","volume":"56","author":"Munir","year":"2014","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b29","series-title":"ESEM\u201908: Proceedings of the 2008 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement","first-page":"178","article-title":"Strength of evidence in systematic reviews in software engineering","author":"Dyb\u00e5","year":"2008"},{"key":"10.1016\/j.infsof.2023.107192_b30","series-title":"Advances and Trends in Artificial Intelligence. From Theory to Practice","first-page":"426","article-title":"Jaskier: A supporting software tool for continuous build outcome prediction practice","author":"Kawalerowicz","year":"2021"},{"issue":"4","key":"10.1016\/j.infsof.2023.107192_b31","doi-asserted-by":"crossref","first-page":"249","DOI":"10.2478\/fcds-2014-0014","article-title":"Software measurement and defect prediction with depress extensible framework","volume":"39","author":"Madeyski","year":"2014","journal-title":"Found. Comput. Decis. Sci."},{"key":"10.1016\/j.infsof.2023.107192_b32","series-title":"Proceedings of the 6th International Conference on Predictive Models in Software Engineering","first-page":"9:1","article-title":"Towards identifying software project clusters with regard to defect prediction","author":"Jureczko","year":"2010"},{"key":"10.1016\/j.infsof.2023.107192_b33","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10515-011-0092-1","article-title":"Sample-based software defect prediction with active and semi-supervised learning","volume":"19","author":"Li","year":"2012","journal-title":"Autom. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b34","series-title":"Electronic Engineering and Computing Technology","first-page":"189","article-title":"Metrics-driven software quality prediction without prior fault data","volume":"60","author":"Catal","year":"2010"},{"issue":"2","key":"10.1016\/j.infsof.2023.107192_b35","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TSE.2017.2770124","article-title":"A systematic literature review and meta-analysis on cross project defect prediction","volume":"45","author":"Hosseini","year":"2019","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b36","series-title":"2013 10th Working Conference on Mining Software Repositories","first-page":"409","article-title":"Better cross company defect prediction","author":"Peters","year":"2013"},{"key":"10.1016\/j.infsof.2023.107192_b37","series-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","first-page":"508","article-title":"Heterogeneous defect prediction","author":"Nam","year":"2015"},{"issue":"4","key":"10.1016\/j.infsof.2023.107192_b38","doi-asserted-by":"crossref","first-page":"3440","DOI":"10.1016\/j.eswa.2010.08.130","article-title":"Thresholds based outlier detection approach for mining class outliers: An empirical case study on software measurement datasets","volume":"38","author":"Alan","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.infsof.2023.107192_b39","series-title":"2011 33rd International Conference on Software Engineering","first-page":"481","article-title":"Dealing with noise in defect prediction","author":"Kim","year":"2011"},{"key":"10.1016\/j.infsof.2023.107192_b40","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/j.infsof.2017.03.007","article-title":"TLEL: A two-layer ensemble learning approach for just-in-time defect prediction","volume":"87","author":"Yang","year":"2017","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b41","series-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","first-page":"448","article-title":"Defect prediction guided search-based software testing","author":"Perera","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b42","first-page":"3403","article-title":"A rule-based prediction method for defect detection in software system","volume":"95","author":"Dhanalaxmi","year":"2017","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b43","series-title":"Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice","first-page":"286","article-title":"An experience report on defect modelling in practice: Pitfalls and challenges","author":"Tantithamthavorn","year":"2018"},{"key":"10.1016\/j.infsof.2023.107192_b44","doi-asserted-by":"crossref","first-page":"82764","DOI":"10.1109\/ACCESS.2019.2923821","article-title":"Analyses of classifier\u2019s performance measures used in software fault prediction studies","volume":"7","author":"Rizwan","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.infsof.2023.107192_b45","series-title":"2017 IEEE International Conference on Cybernetics and Computational Intelligence","first-page":"19","article-title":"Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset","author":"Meiliana","year":"2017"},{"key":"10.1016\/j.infsof.2023.107192_b46","series-title":"Return on Investment in Training and Performance Improvement Programs (Second Edition)","first-page":"32","article-title":"Chapter 2 - ROI model","author":"Phillips","year":"2003"},{"key":"10.1016\/j.infsof.2023.107192_b47","series-title":"The Six Sigma Handbook: a Complete Guide for Green Belts, Black Belts, and Managers at All Levels","first-page":"269","author":"Pyzdek","year":"2003"},{"issue":"2","key":"10.1016\/j.infsof.2023.107192_b48","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1109\/TSE.2022.3165938","article-title":"How should software engineering secondary studies include grey material?","volume":"49","author":"Kitchenham","year":"2023","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/j.infsof.2023.107192_b49","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.3233\/JIFS-169146","article-title":"Would wider adoption of reproducible research be beneficial for empirical software engineering research?","volume":"32","author":"Madeyski","year":"2017","journal-title":"J. Intell. Fuzzy Systems"},{"key":"10.1016\/j.infsof.2023.107192_b50","series-title":"Proceedings of the 9th International Conference on Software Engineering and Applications - ICSOFT-EA","first-page":"383","article-title":"A framework for adoption of machine learning in industry for software defect prediction","author":"Rana","year":"2014"},{"key":"10.1016\/j.infsof.2023.107192_b51","series-title":"2016 23rd Asia-Pacific Software Engineering Conference","first-page":"153","article-title":"A map of threats to validity of systematic literature reviews in software engineering","author":"Zhou","year":"2016"},{"key":"10.1016\/j.infsof.2023.107192_b52","series-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","first-page":"415","article-title":"How practitioners perceive the relevance of software engineering research","author":"Lo","year":"2015"},{"key":"10.1016\/j.infsof.2023.107192_b53","series-title":"2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS)","first-page":"374","article-title":"On the defect prediction for large scale software systems \u2013 From defect density to machine learning","author":"Pradhan","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b54","series-title":"IEEE\/ACM 42nd International Conference on Software Engineering Workshops (ICSEW\u201920)","first-page":"203","article-title":"OffSide: Learning to identify mistakes in boundary conditions","author":"Briem","year":"2020"},{"issue":"3","key":"10.1016\/j.infsof.2023.107192_b55","doi-asserted-by":"crossref","DOI":"10.1145\/3436877","article-title":"DeepWukong: Statically detecting software vulnerabilities using deep graph neural network","volume":"30","author":"Cheng","year":"2021","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.infsof.2023.107192_b56","article-title":"On the prediction of long-lived bugs: An analysis and comparative study using FLOSS projects","volume":"132","author":"Gomes","year":"2020","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b57","series-title":"ICSE 2020 Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering","first-page":"554","article-title":"An investigation of cross-project learning in online just-in-time software defect prediction","author":"Tabassum","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b58","series-title":"2017 IEEE\/ACM 14th International Conference on Mining Software Repositories","first-page":"412","article-title":"Continuous build outcome prediction: A small-n experiment in settings of a real software project","author":"Kawalerowicz","year":"2021"},{"issue":"2","key":"10.1016\/j.infsof.2023.107192_b59","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s11219-016-9353-3","article-title":"Software defect prediction: Do different classifiers find the same defects?","volume":"26","author":"Bowes","year":"2018","journal-title":"Softw. Qual. J."},{"issue":"1","key":"10.1016\/j.infsof.2023.107192_b60","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1515\/fcds-2018-0002","article-title":"Cost effectiveness of software defect prediction in an industrial project","volume":"43","author":"Hryszko","year":"2018","journal-title":"Found. Comput. Decis. Sci."},{"key":"10.1016\/j.infsof.2023.107192_b61","first-page":"1","article-title":"Studying aging-related bug prediction using cross-project models","volume":"PP","author":"Qin","year":"2018","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.infsof.2023.107192_b62","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.infsof.2018.10.001","article-title":"Automatically identifying code features for software defect prediction: Using AST N-grams","volume":"106","author":"Shippey","year":"2019","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2023.107192_b63","doi-asserted-by":"crossref","unstructured":"H.K. Dam, T. Pham, S.W. Ng, T. Tran, J. Grundy, A. Ghose, T. Kim, C.-J. Kim, Lessons Learned from Using a Deep Tree-Based Model for Software Defect Prediction in Practice, in: 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories, MSR, 2019, pp. 46\u201357.","DOI":"10.1109\/MSR.2019.00017"},{"key":"10.1016\/j.infsof.2023.107192_b64","series-title":"2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering","first-page":"526","article-title":"Performance tuning for automotive software fault prediction","author":"Altinger","year":"2017"},{"key":"10.1016\/j.infsof.2023.107192_b65","first-page":"695","article-title":"The importance of accounting for real-world labelling when predicting software vulnerabilities","author":"Jimenez","year":"2019"},{"key":"10.1016\/j.infsof.2023.107192_b66","series-title":"Proceedings of the 41st International Conference on Software Engineering","first-page":"60","article-title":"Leopard: Identifying vulnerable code for vulnerability assessment through program metrics","author":"Du","year":"2019"},{"issue":"OOPSLA","key":"10.1016\/j.infsof.2023.107192_b67","doi-asserted-by":"crossref","DOI":"10.1145\/3276517","article-title":"DeepBugs: A learning approach to name-based bug detection","volume":"2","author":"Pradel","year":"2018","journal-title":"Proc. ACM Program. Lang."},{"key":"10.1016\/j.infsof.2023.107192_b68","series-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","first-page":"373","article-title":"How incidental are the incidents? Characterizing and prioritizing incidents for large-scale online service systems","author":"Chen","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b69","doi-asserted-by":"crossref","unstructured":"R. Chopra, S. Roy, R. Malhotra, Transductive Instance Transfer Learning for Cross-Language Defect Prediction, in: 2022 4th Asia Pacific Information Technology Conference, New York, NY, USA, ISBN: 9781450395571, 2022, pp. 176\u2013182, http:\/\/dx.doi.org\/10.1145\/3512353.3512379.","DOI":"10.1145\/3512353.3512379"},{"key":"10.1016\/j.infsof.2023.107192_b70","series-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","first-page":"315","article-title":"Real-time incident prediction for online service systems","author":"Zhao","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b71","series-title":"Proceedings of the 34th IEEE\/ACM International Conference on Automated Software Engineering","first-page":"352","article-title":"IFeedback: Exploiting user feedback for real-time issue detection in large-scale online service systems","author":"Zheng","year":"2019"},{"key":"10.1016\/j.infsof.2023.107192_b72","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.isatra.2019.11.020","article-title":"Evolutionary extreme learning machine with sparse cost matrix for imbalanced learning","volume":"100","author":"Li","year":"2020","journal-title":"ISA Trans."},{"key":"10.1016\/j.infsof.2023.107192_b73","first-page":"751","article-title":"Analyzing machine learning techniques for fault prediction using web applications","volume":"14","author":"Malhotra","year":"2018","journal-title":"J. Inform. Process. Syst."},{"key":"10.1016\/j.infsof.2023.107192_b74","doi-asserted-by":"crossref","unstructured":"C.S. Melo, M. Cruz, A.D.F. Martins, T. Matos, J.M. da\u00a0Silva Monteiro\u00a0Filho, J.C. Machado, A Practical Guide to Support Change-proneness Prediction, in: International Conference on Enterprise Information Systems, 2019.","DOI":"10.5220\/0007727702690276"},{"key":"10.1016\/j.infsof.2023.107192_b75","series-title":"2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation","first-page":"98","article-title":"Failure of one, fall of many: An exploratory study of software features for defect prediction","author":"dos Santos","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b76","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TSE.2018.2791521","article-title":"ConPredictor: Concurrency defect prediction in real-world applications","volume":"45","author":"Yu","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b77","series-title":"Proceedings of the 2019 3rd International Conference on Software and E-Business","first-page":"60","article-title":"Classification based software defect prediction model for finance software system - An industry study","author":"Zong","year":"2019"},{"key":"10.1016\/j.infsof.2023.107192_b78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3345628","article-title":"Precise learn-to-rank fault localization using dynamic and static features of target programs","volume":"28","author":"Kim","year":"2019","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.infsof.2023.107192_b79","series-title":"2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","first-page":"44","article-title":"Getting defect prediction into industrial practice: The ELFF tool","author":"Bowes","year":"2017"},{"key":"10.1016\/j.infsof.2023.107192_b80","series-title":"2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA)","first-page":"1045","article-title":"A study on software metric selection for software fault prediction","author":"Wang","year":"2019"},{"key":"10.1016\/j.infsof.2023.107192_b81","series-title":"2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR)","first-page":"58","article-title":"Learning off-by-one mistakes: An empirical study","author":"Sellik","year":"2021"},{"key":"10.1016\/j.infsof.2023.107192_b82","series-title":"2017 IEEE 29th International Conference on Tools with Artificial Intelligence","first-page":"45","article-title":"Convolutional neural networks over control flow graphs for software defect prediction","author":"Viet\u00a0Phan","year":"2017"},{"key":"10.1016\/j.infsof.2023.107192_b83","series-title":"2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES)","first-page":"37","article-title":"Convolutional neural networks on assembly code for predicting software defects","author":"Phan","year":"2017"},{"issue":"4","key":"10.1016\/j.infsof.2023.107192_b84","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1002\/spe.2927","article-title":"Predicting just-in-time software defects to reduce post-release quality costs in the maritime industry","volume":"51","author":"Kang","year":"2021","journal-title":"Softw. - Pract. Exp."},{"issue":"4","key":"10.1016\/j.infsof.2023.107192_b85","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.1007\/s10664-015-9401-9","article-title":"Automated bug assignment: Ensemble-based machine learning in large scale industrial contexts","volume":"21","author":"Jonsson","year":"2016","journal-title":"Empirical Softw. Engg."},{"key":"10.1016\/j.infsof.2023.107192_b86","series-title":"2021 IEEE\/ACM International Conference on Automation of Software Test","first-page":"30","article-title":"Using machine learning to build test oracles: An industrial case study on elevators dispatching algorithms","author":"Arrieta","year":"2021"},{"key":"10.1016\/j.infsof.2023.107192_b87","series-title":"2018 IEEE International Conference on Cloud Computing Technology and Science","first-page":"284","article-title":"PReT: A tool for automatic phase-based regression testing","author":"Bhattacharyya","year":"2018"},{"key":"10.1016\/j.infsof.2023.107192_b88","series-title":"2018 IEEE 11th International Conference on Software Testing, Verification and Validation","first-page":"297","article-title":"Virtualized-fault injection testing: A machine learning approach","author":"Khosrowjerdi","year":"2018"},{"key":"10.1016\/j.infsof.2023.107192_b89","doi-asserted-by":"crossref","DOI":"10.1007\/s10515-021-00287-w","article-title":"Traceability recovery between bug reports and test cases-a Mozilla Firefox case study","volume":"28","author":"Gadelha","year":"2021","journal-title":"Autom. Softw. Eng."},{"key":"10.1016\/j.infsof.2023.107192_b90","series-title":"Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, 2019, Proceedings, Part III","first-page":"212","article-title":"Towards one reusable model for various software defect mining tasks","author":"Li","year":"2019"},{"key":"10.1016\/j.infsof.2023.107192_b91","series-title":"Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","article-title":"MTFuzz: Fuzzing with a multi-task neural network","author":"She","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b92","series-title":"2020 IEEE International Conference On Artificial Intelligence Testing (AITest)","first-page":"123","article-title":"Neural network classification for improving continuous regression testing","author":"Marijan","year":"2020"},{"key":"10.1016\/j.infsof.2023.107192_b93","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2021.110993","article-title":"Automated defect prioritization based on defects resolved at various project periods","volume":"179","author":"Gokceoglu","year":"2021","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2023.107192_b94","series-title":"Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"491","article-title":"Empirically evaluating readily available information for regression test optimization in continuous integration","author":"Elsner","year":"2021"},{"key":"10.1016\/j.infsof.2023.107192_b95","series-title":"IEEE 41st International Conference on Distributed Computing Systems","first-page":"1110","article-title":"Demo: Automatically retrainable self improving model for the automated classification of software incidents into multiple classes","author":"Agrawal","year":"2021"},{"key":"10.1016\/j.infsof.2023.107192_b96","series-title":"DeepOrder: Deep learning for test case prioritization in continuous integration testing","author":"Sharif","year":"2021"},{"key":"10.1016\/j.infsof.2023.107192_b97","series-title":"2020 IEEE International Conference on Software Maintenance and Evolution","first-page":"727","article-title":"Efficient bug triage for industrial environments","author":"Zhang","year":"2020"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000460?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584923000460?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T16:46:17Z","timestamp":1714236377000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584923000460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":97,"alternative-id":["S0950584923000460"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107192","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Industrial applications of software defect prediction using machine learning: A business-driven systematic literature review","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2023.107192","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"107192"}}