Proceedings of the 4th India Software Engineering Conference 2011
DOI: 10.1145/1953355.1953381
|View full text |Cite
|
Sign up to set email alerts
|

Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis

Abstract: Open source software projects are characterized as self organizing and dynamic in which volunteers around the world primarily driven by self-motivation (and not necessarily monetary compensation) contribute and collaborate to a software product. In contrast to close source or proprietary software, the organizational structure and task allocation in an open source project setting is unstructured. Software project managers perform risk, threat and vulnerability analysis to gain insights into the organizational s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 21 publications
0
20
0
1
Order By: Relevance
“…They evaluated that network metrics can discriminate between vulnerable and neutral files and predict vulnerabilities. Sureka et al [21] derived a collaboration network from a defect tracking system and applied network analysis to investigate the derived network for the purpose of risk and vulnerability analysis. They demonstrated that important information of risk and vulnerability can be uncovered using network analysis techniques.…”
Section: Network Metrics For Applicationmentioning
confidence: 99%
“…They evaluated that network metrics can discriminate between vulnerable and neutral files and predict vulnerabilities. Sureka et al [21] derived a collaboration network from a defect tracking system and applied network analysis to investigate the derived network for the purpose of risk and vulnerability analysis. They demonstrated that important information of risk and vulnerability can be uncovered using network analysis techniques.…”
Section: Network Metrics For Applicationmentioning
confidence: 99%
“…To this end, a first line of works has used data that directly capture communication [13], e.g. via IRC channels [14], E-Mail exchanges [15,16,17,18,19], mailing lists [20], or communication via issue trackers [21,22,23,24,25].…”
Section: Related Workmentioning
confidence: 99%
“…A bug tracking system (i.e., defect/issue/problem tracking system) [33] is a repository to manage bug reports within the life-cycle of software. In bug tracking systems, communication is performed by comments, so DSNs can be constructed by relationships of comments [33][34][35][36][37][38]. The first rule to construct bug tracking system based DSNs (BTS-DSNs) is: if two developers both comment on a common bug report, there is a link between them in the DSN.…”
Section: Bug Tracking System Based Dsnsmentioning
confidence: 99%