REFERENCES
Bakota, T., Heged
˝
us, P., Siket, I., Lad
´
anyi, G., and Ferenc,
R. (2014). QualityGate SourceAudit: a Tool for As-
sessing the Technical Quality of Software. In Pro-
ceedings of the CSMR-WCRE 2014 Software Evolu-
tion Week (Merger of the 18th IEEE European Con-
ference on Software Maintenance and Reengineering
& 21st IEEE Working Conference on Reverse Engi-
neering - CSMR-WCRE 2014), pages 440–445. IEEE.
Camilo, F., Meneely, A., and Nagappan, M. (2015). Do
bugs foreshadow vulnerabilities? a study of the
chromium project. In 2015 IEEE/ACM 12th Working
Conference on Mining Software Repositories, pages
269–279.
Delphine Immaculate, S., Farida Begam, M., and Flo-
ramary, M. (2019). Software bug prediction using su-
pervised machine learning algorithms. In 2019 Inter-
national Conference on Data Science and Communi-
cation (IconDSC), pages 1–7.
Ferenc, R., Heged
˝
us, P., Gyimesi, P., Antal, G., B
´
an, D., and
Gyim
´
othy, T. (2019). Challenging machine learning
algorithms in predicting vulnerable javascript func-
tions. In Proceedings of the 7th International Work-
shop on Realizing Artificial Intelligence Synergies in
Software Engineering, RAISE ’19, page 8–14. IEEE
Press.
Ferenc, R., Viszkok, T., Aladics, T., J
´
asz, J., and Heged
˝
us,
P. (2020). Deep-water framework: The swiss army
knife of humans working with machine learning mod-
els. SoftwareX, 12:100551.
Gyimesi, P. (2017). Automatic calculation of process met-
rics and their bug prediction capabilities. Acta Cyber-
netica, 23:537–559.
Hammouri, A., Hammad, M., Alnabhan, M., and Al-
sarayrah, F. (2018). Software bug prediction using
machine learning approach. International Journal of
Advanced Computer Science and Applications, 9.
Jureczko, M. and Madeyski, L. (2011). A review of pro-
cess metrics in defect prediction studies. Methods of
Applied Computer Science, 5:133–145.
Kaur, K. and Chopra, D. (2016). An empirical study of
software entropy based bug prediction using machine
learning. International Journal of System Assurance
Engineering and Management, 8.
Krsul, I. (2011). Software vulnerability analysis. ETD Col-
lection for Purdue University.
Lachenbruch, P. A. (2014). Mcnemar test. Wiley StatsRef:
Statistics Reference Online.
Melo, C., da Cruz, M. L., Martins, A., Matos, T., Filho, J.,
and Machado, J. (2019). A practical guide to support
change-proneness prediction. In Proceedings of the
21st International Conference on Enterprise Informa-
tion Systems - Volume 2: ICEIS,, pages 269–276. IN-
STICC, SciTePress.
Mnkandla, E. and Mpofu, B. (2016). Software defect
prediction using process metrics elasticsearch engine
case study. In 2016 International Conference on Ad-
vances in Computing and Communication Engineer-
ing (ICACCE), pages 254–260.
Puranik, S., Deshpande, P., and Chandrasekaran, K. (2016).
A novel machine learning approach for bug predic-
tion. Procedia Computer Science, 93:924–930.
Rahman, F. and Devanbu, P. (2013). How, and why, process
metrics are better. pages 432–441.
Scandariato, R., Walden, J., Hovsepyan, A., and Joosen, W.
(2014). Predicting vulnerable software components
via text mining. IEEE Transactions on Software En-
gineering, 40(10):993–1006.
Shin, Y., Meneely, A., Williams, L., and Osborne, J. A.
(2011). Evaluating complexity, code churn, and devel-
oper activity metrics as indicators of software vulnera-
bilities. IEEE Transactions on Software Engineering,
37(6):772–787.
Shin, Y. and Williams, L. A. (2011). Can traditional fault
prediction models be used for vulnerability predic-
tion? Empirical Software Engineering, 18:25–59.
Stani
´
c, B. and Afzal, W. (2017). Process metrics are not
bad predictors of fault proneness. In 2017 IEEE Inter-
national Conference on Software Quality, Reliability
and Security Companion (QRS-C), pages 493–499.
Sultana, K. Z. and Williams, B. J. (2017). Evaluating micro
patterns and software metrics in vulnerability predic-
tion. In 2017 6th International Workshop on Software
Mining (SoftwareMining), pages 40–47.
Theisen, C., Herzig, K., Morrison, P., Murphy, B., and
Williams, L. (2015). Approximating attack surfaces
with stack traces. In 2015 IEEE/ACM 37th IEEE In-
ternational Conference on Software Engineering, vol-
ume 2, pages 199–208.
T
´
oth, Z., Gyimesi, P., and Ferenc, R. (2016). A public bug
database of github projects and its application in bug
prediction. In ICCSA.
Zimmermann, T., Nagappan, N., and Williams, L. (2010).
Searching for a needle in a haystack: Predicting secu-
rity vulnerabilities for windows vista. In 2010 Third
International Conference on Software Testing, Verifi-
cation and Validation, pages 421–428.
APPENDIX
Table 6: Process Metrics.
Metric Description
AVGNOAL Average Number Of Added Lines
AVGNODL Average Number Of Deleted Lines
AVGNOEMT Average Number Of Elements Modified Together
AVGNOML Average Number of Modified Lines
AVGTBC Average Time Between Changes
CChurn Sum of lines added minus lines deleted
MNOAL Maximum Number of Added Lines
MNODL Maximum Number of Deleted Lines
MNOEMT Maximum Number of Elements Modified Together
MNOML Maximum Number of Modified Lines
NOADD Number of Additions
NOCC Number of Contributor Changes
NOCHG Number of Changes
NOContr Number of Contributors
NODEL Number of Deletions
NOMOD Number of Modifications
SOADD Sum of Added Lines
SODEL Sum of Deleted Lines
SOMOD Sum of Modified Lines
ICSOFT 2021 - 16th International Conference on Software Technologies
194