This work is licensed under the Creative Commons Attribution 4.0 International License.
C. De Souza, J. Froehlich, and P. Dourish, “Seeking the source: software source code as a social and technical artifact,” in Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work, Nov. 2005, pp. 197–206. https://doi.org/10.1145/1099203.1099239Search in Google Scholar
K. Sharan and A. L. Davis, Beginning Java 17 Fundamentals: Object-Oriented Programming in Java 17, Springer, 2021.Search in Google Scholar
M. Allamanis and C. Sutton, “Mining source code repositories at massive scale using language modeling,” in 2013 10th Working Conference on Mining Software Repositories (MSR), San Francisco, CA, USA, May 2013, pp. 207–216. https://doi.org/10.1109/MSR.2013.6624029Search in Google Scholar
A. Marcus and J. I. Maletic, “Identification of high-level concept clones in source code,” in Proceedings 16th annual international conference on automated software engineering (ASE 2001), San Diego, CA, USA, Nov. 2001, pp. 107–114. https://doi.org/10.1109/ASE.2001.989796Search in Google Scholar
P. Zeng, G. Lin, J. Zhang, and Y. Zhang, “Intelligent detection of vulnerable functions in software through neural embedding-based code analysis,” International Journal of Network Management, vol. 33, no. 3, 2023, Art. no. e2198. https://doi.org/10.1002/nem.2198Search in Google Scholar
A. Puspaningrum, M. A. A. Hilmi, M. Mustamiin, M. I. Ginanjar, and Darsih, “Vulnerable source code detection using sonarcloud code analysis,” arXiv, preprint arXiv:2307.02446, 2023. https://doi.org/10.48550/arXiv.2307.02446Search in Google Scholar
A. Kaur and R. Nayyar, “A comparative study of static code analysis tools for vulnerability detection in C/C++ and Java source code,” Procedia Computer Science, vol. 171, 2020, pp. 2023–2029. https://doi.org/10.1016/j.procs.2020.04.217Search in Google Scholar
J. Oliveira, M. Souza, M. Flauzino, R. Durelli, and E. Figueiredo, “Can source code analysis indicate programming skills? A survey with developers,” in International Conference on the Quality of Information and Communications Technology, Sep. 2022, pp. 156–171. https://doi.org/10.1007/978-3-031-14179-9_11Search in Google Scholar
I. Ruiz-Rube, T. Person, J. M. Dodero, J. M. Mota, J. M. Sánchez-Jara, “Applying static code analysis for domain-specific languages,” Software and Systems Modeling, vol. 19, no. 1, Apr. 2020, pp. 95–110. https://doi.org/10.1007/s10270-019-00729-wSearch in Google Scholar
D. Giebas and R. Wojszczyk, “Detection of concurrency errors in multithreaded applications based on static source code analysis,” IEEE Access, vol. 9, pp. 61298–61323, Apr. 2021. https://doi.org/10.1109/ACCESS.2021.3073859Search in Google Scholar
K. Kawaguchi, “Java API for GitHub.” [Online]. Available: https://github.com/hub4j/github-api. Accessed on: Aug. 13, 2023.Search in Google Scholar
I. Cohen, Y. Huang, J. Chen, J. Benesty, J. Benesty, J. Chen, Y. Huang, and I. Cohen, “Pearson correlation coefficient,” in Noise Reduction in Speech Processing. Springer Topics in Signal Processing, vol. 2. Springer, Berlin, Heidelberg, 2009, pp. 1–4. https://doi.org/10.1007/978-3-642-00296-0_5Search in Google Scholar
P. Schober, C. Boer, and L. A. Schwarte, “Correlation coefficients: appropriate use and interpretation,” Anesthesia & Analgesia, vol. 126, no. 5, May 2018, pp. 1763–1768. https://doi.org/10.1213/ANE.0000000000002864Search in Google Scholar
K. Bhatt, V. Tarey, P. Patel, K. B. Mits, and D. Ujjain, “Analysis of source lines of code (SLOC) metric,” International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 5, May 2012, pp. 150–154. https://www.researchgate.net/profile/Kaushal-Bhatt-5/publication/281840565_Analysis_Of_Source_Lines_Of_CodeSLOC_Metric/links/55fab79608aeba1d9f37bcac/Analysis-Of-Source-Lines-Of-CodeSLOC-Metric.pdfSearch in Google Scholar
E. Morozoff, “Using a line of code metric to understand software rework,” IEEE Software, vol. 27, no. 1, Sep. 2009, pp. 72–77. https://doi.org/10.1109/MS.2009.160Search in Google Scholar
R. Park, “Software size measurement: A framework for counting source statements,” Tech. Rep. CMU/SEI-92-TR-020, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, 1992. [Online]. Available: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=d3f99e79a92ba536f90ffae0a1272424751ae6eaSearch in Google Scholar
P. Rani, S. Panichella, M. Leuenberger, A. Di Sorbo, and O. Nierstrasz, “How to identify class comment types? A multi-language approach for class comment classification,” Journal of Systems and Software, vol. 181, 2021, Art. no. 111047. https://doi.org/10.1016/j.jss.2021.111047Search in Google Scholar
D. Greenfieldboyce and J. S. Foster, “Type qualifier inference for Java,” in Proceedings of the 22nd Annual ACM SIGPLAN Conference on Objectoriented Programming Systems, Languages and Applications, Oct. 2007, pp. 321–336. https://doi.org/10.1145/1297027.1297051Search in Google Scholar
M. Coblenz, J. Sunshine, J. Aldrich, B. Myers, S. Weber, and F. Shull, “Exploring language support for immutability,” in Proceedings of the 38th International Conference on Software Engineering, May 2016, pp. 736–747. https://doi.org/10.1145/2884781.2884798Search in Google Scholar
D. Strmecki and D. Strmecki, “The Java final keyword – impact on performance – baeldung,” May 2021. [Online]. Available: https://www.baeldung.com/java-final-performanceSearch in Google Scholar
S. Nakshatri, M. Hegde, and S. Thandra, “Analysis of exception handling patterns in Java projects: An empirical study,” in Proceedings of the 13th International Conference on Mining Software Repositories, May 2016, pp. 500–503. https://doi.org/10.1145/2901739.2903499Search in Google Scholar
S. Tarwani and A. Chug, “Illustration and detection of exception handling bad smells,” in 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, Jun. 2021, pp. 804–810. https://ieeexplore.ieee.org/document/9441470Search in Google Scholar
R. C. Martin, Clean Code: A Handbook of Agile Software Craftsmanship, Pearson Education, 2009.Search in Google Scholar
C. Na, Y. Choi, J.-H. Lee, “DIP: Dead code insertion based black-box attack for programming language model,” in Proceedings of the 61stAnnual Meeting of the Association for Computational Linguistics, vol. 1, Toronto, Canada, Jul. 2023, pp. 7777–7791. https://doi.org/10.18653/v1/2023.acl-long.430Search in Google Scholar
Y. Smaragdakis, “Interfaces for nested classes,” in The 8th International Workshop on ObjectOriented Languages (FOOL8), 2001. [Online]. Available: https://www.cis.upenn.edu/~bcpierce/FOOL/FOOL8/yannis.pdfSearch in Google Scholar