Author:
Bibyan Ritu,Anand Sameer,Jaiswal Ajay
Reference20 articles.
1. Menzies T, Marcus A (2008) Automated severity assessment of software defect reports. In: IEEE international conference on software maintenance, 2008. ICSM 2008. IEEE, pp. 346–355
2. Lamkanfi A, Demeyer S, Giger E, Goethals B (2010) Predicting the severity of a reported bug. In: 2010 7th IEEE working conference on mining software repositories (MSR). IEEE, pp 1–10
3. Lamkanfi A, Demeyer S, Soetens QD, Verdonck T (2011) Comparing mining algorithms for predicting the severity of a reported bug. In: CSMR, Carl von Ossietzky University, Oldenburg, Germany. IEEE, New York, pp 249–258
4. Gegick M, Rotella P, Xie T (2010) Identifying security bug reports via text mining: an industrial case study. In: 2010 7th IEEE working conference on mining software repositories (MSR). IEEE, pp 11–20
5. Ghaluh Indah Permata S (2012) An attribute selection for severity level determination according to the support vector machine classification result. In: Proceedings of the international conference on information system business competitiveness
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献