Calero, C. and Piattini, M. (2015). Introduction to green in
software engineering. In Green in Software Engineer-
ing, pages 3–27. Springer.
Chan, W.-K., Cheng, H., and Lo, D. (2012). Searching con-
nected api subgraph via text phrases. In Proceedings of
the ACM SIGSOFT 20th International Symposium on
the Foundations of Software Engineering, pages 1–11.
Chatterjee, P., Damevski, K., and Pollock, L. (2021). Au-
tomatic extraction of opinion-based q&a from online
developer chats. In 2021 IEEE/ACM 43rd Interna-
tional Conference on Software Engineering (ICSE),
pages 1260–1272. IEEE.
Choetkiertikul, M., Dam, H. K., Tran, T., Pham, T., Ghose,
A., and Menzies, T. (2018). A deep learning model for
estimating story points. IEEE Transactions on Software
Engineering, 45(7):637–656.
Chollet, F. et al. (2015). Keras.
https://github.com/fchollet/keras. Accessed Oc-
tober 20, 2022.
CSCRC, CSIRO’s Data61, C. (2022). Small
but stronger: Lifting sme cyber security.
https://tinyurl.com/2juxjnk6. Accessed October
21, 2022.
Cuckoo (2019). Cuckoo: Automated malware analysis.
https://cuckoosandbox.org/. Accessed October 20,
2022.
D3 (2017). Enterprise incident & case management solu-
tion for security orchestration, automation & response.
https://tinyurl.com/5bcwkuk4. Accessed October 20,
2022.
Fakhoury, S., Arnaoudova, V., Noiseux, C., Khomh, F., and
Antoniol, G. (2018). Keep it simple: Is deep learning
good for linguistic smell detection? In 2018 IEEE 25th
International Conference on Software Analysis, Evolu-
tion and Reengineering (SANER), pages 602–611.
Feurer, M. and Hutter, F. (2019). Hyperparameter optimiza-
tion. In Automated Machine Learning, pages 3–33.
Springer, Cham.
Fu, W. and Menzies, T. (2017). Easy over hard: A case study
on deep learning. In Proceedings of the 2017 11th joint
meeting on foundations of software engineering, pages
49–60.
Fucci, D., Mollaalizadehbahnemiri, A., and Maalej, W.
(2019). On using machine learning to identify knowl-
edge in api reference documentation. In Proceedings
of the 2019 27th ACM Joint Meeting on European Soft-
ware Engineering Conference and Symposium on the
Foundations of Software Engineering, pages 109–119.
Gu, X., Zhang, H., Zhang, D., and Kim, S. (2016). Deep
api learning. In Proceedings of the 2016 24th ACM
SIGSOFT International Symposium on Foundations of
Software Engineering, pages 631–642.
Haque, M. U., Kholoosi, M. M., and Babar, M. A. (2022).
Kgsecconfig: A knowledge graph based approach for
secured container orchestrator configuration. In 2022
IEEE 29th International Conference on Software Anal-
ysis, Evolution, and Reengineering (SANER). IEEE.
He, X., Xu, L., Zhang, X., Hao, R., Feng, Y., and Xu, B.
(2021). Pyart: Python api recommendation in real-time.
In 2021 IEEE/ACM 43rd International Conference on
Software Engineering (ICSE), pages 1634–1645. IEEE.
Huang, Q., Xia, X., Xing, Z., Lo, D., and Wang, X. (2018).
Api method recommendation without worrying about
the task-api knowledge gap. In 2018 33rd IEEE/ACM
International Conference on Automated Software En-
gineering (ASE), pages 293–304. IEEE.
Instinct, D. (2021). Research study by deep instinct.
https://www.helpnetsecurity.com/2021/02/17/malware-
2020/. Accessed February 10, 2022.
Le, T. H. M., Hin, D., Croft, R., and Babar, M. A. (2020).
Puminer: Mining security posts from developer ques-
tion and answer websites with pu learning. In Proceed-
ings of the 17th International Conference on Mining
Software Repositories, pages 350–361.
LeCun, Y., Bengio, Y., and Hinton, G. (2015). Deep learning.
nature, 521(7553):436–444.
Limacharlie (2022). Official limacharlie page.
https://www.limacharlie.io/. Accessed October
20, 2022.
Ling, C., Lin, Z., Zou, Y., and Xie, B. (2020). Adaptive deep
code search. In Proceedings of the 28th International
Conference on Program Comprehension, pages 48–59.
Ling, C.-Y., Zou, Y.-Z., Lin, Z.-Q., and Xie, B. (2019).
Graph embedding based api graph search and recom-
mendation. Journal of Computer Science and Technol-
ogy, 34(5):993–1006.
Ma, E. (2019). Nlp augmentation.
https://github.com/makcedward/nlpaug. Accessed
October 20, 2022.
McHugh, M. L. (2012). Interrater reliability: the kappa
statistic. Biochemia medica, 22(3):276–282.
McMillan, C., Grechanik, M., Poshyvanyk, D., Xie, Q., and
Fu, C. (2011). Portfolio: finding relevant functions and
their usage. In Proceedings of the 33rd International
Conference on Software Engineering, pages 111–120.
Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., and
Dean, J. (2013). Distributed representations of words
and phrases and their compositionality. In Advances
in neural information processing systems, pages 3111–
3119.
MISP (2022). Malware information sharing platform.
https://www.misp-project.org. Accessed October 20,
2022.
Misra, S. and Li, H. (2020). Chapter 9 - noninvasive fracture
characterization based on the classification of sonic
wave travel times. In Misra, S., Li, H., and He, J.,
editors, Machine Learning for Subsurface Characteri-
zation, pages 243–287. Gulf Professional Publishing.
Mou, L., Li, G., Zhang, L., Wang, T., and Jin, Z. (2016).
Convolutional neural networks over tree structures for
programming language processing. In Thirtieth AAAI
conference on artificial intelligence.
Muncaster, P. (2021). Organizations now have 76
security tools to manage. https://www.infosecurity-
magazine.com/news/organizations-76-security-tools/.
Accessed October 20, 2022.
Nguyen, T. D., Nguyen, A. T., Phan, H. D., and Nguyen, T. N.
(2017). Exploring api embedding for api usages and
applications. In 2017 IEEE/ACM 39th International
Security Tools’ API Recommendation Using Machine Learning
37