Review Article

Predictive Analytics and Software Defect Severity: A Systematic Review and Future Directions

Table 8

Training strategy.

Fold cross-validation[L04], [L06], [L12], [L13], [L14], [L21], [L28], [L22], [L24], [L23], [L30], [L36], [L39], and [L24]
[L26], [L35], [L36], [L39], [L40], [L41], [L42], [L43], [L44], [L48], [L49], and [L51]

Hold-out[L01], [L02], [L03], [L05], [L07], [L08], [L09], [L10], [L11], [L12], [L15], [L16], [L17], and [L18]
[L19], [L20], and [L25]
[L31], [L32], [L33], [L34], [L37], [L38], [L45], [L46], [L47], and [L50]