<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02373nab a2200277 i 4500</leader>
  <controlfield tag="001">publ38520</controlfield>
  <controlfield tag="005">20251216083840.0</controlfield>
  <controlfield tag="008">251216s2025    hu      o     000   eng d</controlfield>
  <datafield tag="022" ind1=" " ind2=" ">
   <subfield code="a">1049-331X</subfield>
  </datafield>
  <datafield tag="024" ind1="7" ind2=" ">
   <subfield code="a">10.1145/3769105</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="024" ind1="7" ind2=" ">
   <subfield code="a">36362772</subfield>
   <subfield code="2">mtmt</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">SZTE Publicatio Repozitórium</subfield>
   <subfield code="b">hun</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Hinrichs Torge</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Back to the Roots</subfield>
   <subfield code="h">[elektronikus dokumentum] :</subfield>
   <subfield code="b">Assessing Mining Techniques for Java Vulnerability-Contributing Commits /</subfield>
   <subfield code="c"> Hinrichs Torge</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="c">2025</subfield>
  </datafield>
  <datafield tag="490" ind1="0" ind2=" ">
   <subfield code="a">ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY</subfield>
   <subfield code="v">1</subfield>
  </datafield>
  <datafield tag="520" ind1="3" ind2=" ">
   <subfield code="a">Context : Vulnerability-contributing commits (VCCs) are code changes that introduce vulnerabilities. Mining historical VCCs relies on SZZ-based algorithms that trace from known vulnerability-fixing commits. Objective : Although these techniques have been used, e.g., to train just-in-time vulnerability predictors, they lack systematic benchmarking to evaluate their precision, recall, and error sources. Method : We empirically assessed 12 VCC mining techniques in Java repositories using two benchmark datasets (one from the literature and one newly curated). We also explored combinations of techniques, through intersections, voting schemes, and machine learning, to improve performance. Results : Individual techniques achieved at most 0.60 precision but up to 0.89 recall. The precision rose to 0.75 when the outputs were combined with the logical AND, at the expense of recall. Machine learning ensembles reached 0.80 precision with a better precision–recall balance. Performance varied significantly by dataset. Analyzing “fixing commits” showed that certain fix types (e.g., filtering or sanitization) affect retrieval accuracy, and failure patterns highlighted weaknesses when fixes involve external data handling. Conclusion : Such results help software security researchers select the most suitable mining technique for their studies and understand new ways to design more accurate solutions.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Számítás- és információtudomány</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="1">
   <subfield code="a">Iannone Emanuele</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="1">
   <subfield code="a">Aladics Tamás</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="1">
   <subfield code="a">Hegedűs Péter</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="2">
   <subfield code="a">De Lucia Andrea</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="2">
   <subfield code="a">Palomba Fabio</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="0" ind2="2">
   <subfield code="a">Scandariato Riccardo</subfield>
   <subfield code="e">aut</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">http://publicatio.bibl.u-szeged.hu/38520/1/j6.pdf</subfield>
   <subfield code="z">Dokumentum-elérés </subfield>
  </datafield>
 </record>
</collection>
