skip to main content
10.1145/2889160.2892648acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
poster

Security expert recommender in software engineering

Published: 14 May 2016 Publication History

Abstract

Software engineering is a complex filed with diverse specialties. By the growth of Internet based applications, information security plays an important role in software development process. Finding expert software engineers who have expertise in information security requires too much effort. Stack Overflow is the largest social Q&A Website in the field of software engineering. Stack Overflow contains developers' posts and answers in different software engineering areas including information security. Security related posts are asked in conjunction with various technologies, programming languages, tools and frameworks. In this paper, the content and metadata of Stack Overflow is analysed to find experts in diverse software engineering security related concepts using information security ontology.

References

[1]
M. Gegick, P. Rotella, and T. Xie, "Identifying security bug reports via text mining: An industrial case study," in Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, 2010, pp. 11--20.
[2]
K. Tsipenyuk, B. Chess, and G. McGraw, "Seven pernicious kingdoms: A taxonomy of software security errors," Security & Privacy, IEEE, vol. 3, pp. 81--84, 2005.
[3]
K. R. Van Wyk and G. McGraw, "Bridging the gap between software development and information security," Security & Privacy, IEEE, vol. 3, pp. 75--79, 2005.
[4]
A. Zagalsky, O. Barzilay, and A. Yehudai, "Example overflow: Using social media for code recommendation," in Proceedings of the Third International Workshop on Recommendation Systems for Software Engineering, 2012, pp. 38--42.
[5]
M. Allamanis and C. Sutton, "Why, when, and what: analyzing stack overflow questions by topic, type, and code," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 53--56.
[6]
M. Asaduzzaman, A. S. Mashiyat, C. K. Roy, and K. A. Schneider, "Answering questions about unanswered questions of stack overflow," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 97--100.
[7]
R. Stevens, J. Ganz, V. Filkov, P. Devanbu, and H. Chen, "Asking for (and about) permissions used by android apps," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 31--40.
[8]
A. Bosu, C. S. Corley, D. Heaton, D. Chatterji, J. C. Carver, and N. A. Kraft, "Building reputation in stackoverflow: an empirical investigation," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 89--92.
[9]
D. Schuler and T. Zimmermann, "Mining usage expertise from version archives," in Proceedings of the 2008 international working conference on Mining software repositories, 2008, pp. 121--124.
[10]
H. Kagdi, M. Gethers, D. Poshyvanyk, and M. Hammad, "Assigning change requests to software developers," Journal of Software: Evolution and Process, vol. 24, pp. 3--33, 2012.
[11]
R. Venkataramani, A. Gupta, A. Asadullah, B. Muddu, and V. Bhat, "Discovery of technical expertise from open source code repositories," in Proceedings of the 22nd international conference on World Wide Web companion, 2013, pp. 97--98.
[12]
M. Linares-Vásquez, B. Dit, and D. Poshyvanyk, "An exploratory analysis of mobile development issues using stack overflow," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 93--96.
[13]
R. Robbes and D. Röthlisberger, "Using developer interaction data to compare expertise metrics," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 297--300.
[14]
R. Shokripour, J. Anvik, Z. M. Kasirun, and S. Zamani, "Why so complicated? simple term filtering and weighting for location-based bug report assignment recommendation," in Proceedings of the 10th Working Conference on Mining Software Repositories, 2013, pp. 2--11.
[15]
H. Naguib, N. Narayan, B. Brugge, and D. Helal, "Bug report assignee recommendation using activity profiles," in Mining Software Repositories (MSR), 2013 10th IEEE Working Conference on, 2013, pp. 22--30.
[16]
I. Steinmacher, I. S. Wiese, and M. A. Gerosa, "Recommending mentors to software project newcomers," in Recommendation Systems for Software Engineering (RSSE), 2012 Third International Workshop on, 2012, pp. 63--67.
[17]
D.-R. Liu, Y.-H. Chen, W.-C. Kao, and H.-W. Wang, "Integrating expert profile, reputation and link analysis for expert finding in question-answering websites," Information Processing & Management, vol. 49, pp. 312--329, 2013.
[18]
M. Ohira, Y. Kashiwa, Y. Yamatani, H. Yoshiyuki, Y. Maeda, N. Limsettho, et al., "A Dataset of High Impact Bugs: Manually-Classified Issue Reports," 2014.
[19]
S. Zaman, B. Adams, and A. E. Hassan, "Security versus performance bugs: a case study on firefox," in Proceedings of the 8th working conference on mining software repositories, 2011, pp. 93--102.
[20]
V. Raskin, C. F. Hempelmann, K. E. Triezenberg, and S. Nirenburg, "Ontology in information security: a useful theoretical foundation and methodological tool," in Proceedings of the 2001 workshop on New security paradigms, 2001, pp. 53--59.
[21]
D. Pletea, B. Vasilescu, and A. Serebrenik, "Security and emotion: sentiment analysis of security discussions on GitHub," in Proceedings of the 11th Working Conference on Mining Software Repositories, 2014, pp. 348--351.
[22]
J. Cardoso and A. Sheth, "Semantic e-workflow composition," Journal of Intelligent Information Systems, vol. 21, pp. 191--225, 2003.

Cited By

View all
  • (2021)Intern retrieval from community question answering websites: A new variation of expert finding problemExpert Systems with Applications10.1016/j.eswa.2021.115044181(115044)Online publication date: Nov-2021
  • (2021)LDA-based term profiles for expert finding in a political settingJournal of Intelligent Information Systems10.1007/s10844-021-00636-xOnline publication date: 23-Mar-2021
  • (2018)A Survey on Expert Recommendation in Community Question AnsweringJournal of Computer Science and Technology10.1007/s11390-018-1845-033:4(625-653)Online publication date: 13-Jul-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '16: Proceedings of the 38th International Conference on Software Engineering Companion
May 2016
946 pages
ISBN:9781450342056
DOI:10.1145/2889160
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 May 2016

Check for updates

Author Tags

  1. expert recommendation
  2. information security
  3. ontology
  4. recommender system
  5. software engineering
  6. stack overflow

Qualifiers

  • Poster

Conference

ICSE '16
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Intern retrieval from community question answering websites: A new variation of expert finding problemExpert Systems with Applications10.1016/j.eswa.2021.115044181(115044)Online publication date: Nov-2021
  • (2021)LDA-based term profiles for expert finding in a political settingJournal of Intelligent Information Systems10.1007/s10844-021-00636-xOnline publication date: 23-Mar-2021
  • (2018)A Survey on Expert Recommendation in Community Question AnsweringJournal of Computer Science and Technology10.1007/s11390-018-1845-033:4(625-653)Online publication date: 13-Jul-2018
  • (2017)Expert recommendation in oss projects based on knowledge embedding2017 International Workshop on Complex Systems and Networks (IWCSN)10.1109/IWCSN.2017.8276520(149-155)Online publication date: Dec-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media