Journal of Systems and Software

Papers
(The median citation count of Journal of Systems and Software is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board288
Portfolio Evolution Analysis for SPL Scoping: Unveiling the dynamics with dedicated time-series dashboards212
EFACT: An External Function Auto-Completion Tool to strengthen static binary lifting208
Different approaches for testing body sensor network applications173
Translating meaning representations to behavioural interface specifications148
Novel framework for automated testing of ill-defined human–robot interaction environments119
Feature models to boost the vulnerability management process103
Understanding participation and corporatization in service of diversity in free/libre and open source software development projects92
Integrating pair programming as a work practice89
Evolution patterns of software-architecture smells: An empirical study of intra- and inter-version smells85
Experimental investigation of memory-related software aging in LLM systems76
Editorial Board76
Domain-specific conflict resolution and model merge76
Investigating end-users’ values in agriculture mobile applications development: An empirical study on Bangladeshi female farmers76
VULOC: Vulnerability location framework based on assembly code slicing75
Fault-tolerant scheduling and data placement for scientific workflow processing in geo-distributed clouds73
Uncovering gender gap in academia: A comprehensive analysis within the software engineering community69
A survey on machine learning techniques applied to source code66
The uphill journey of FaaS in the open-source community65
A systematic literature review on Android-specific smells62
Managing the changing understanding of benefits in software initiatives60
Dear Researchers: Think about the future, for sure, but please don't forget about the present – the Odense Manifesto for academia–industry collaboration at ICSA 202556
On measuring coupling between microservices52
Data preparation for Deep Learning based Code Smell Detection: A systematic literature review51
The effect of advice network connectedness on problem-solving competence among software developers51
Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets50
A MILP model on coordinated coverage path planning system for UAV-ship hybrid team scheduling software49
Deep learning framework testing via hierarchical and heuristic model generation48
A fuzzy logic-based quality model for identifying microservices with low maintainability46
Automatically recognizing the semantic elements from UML class diagram images46
Managing security issues in software containers: From practitioners’ perspective45
Multi-granularity coverage criteria for deep reinforcement learning systems45
Reproducibility of issues reported in stack overflow questions: Challenges, impact & estimation45
Maximizing integrative learning in software development teams: A systematic review of key drivers and future research agenda44
Leveraging belief uncertainty for informed decision making in software product line evolution43
Discovering boundary values of feature-based machine learning classifiers through exploratory datamorphic testing42
Conformance assessment of Architectural Design Decisions on API endpoint designs derived from domain models41
Diverse title generation for Stack Overflow posts with multiple-sampling-enhanced transformer40
A modular metamodel and refactoring rules to achieve software product line interoperability40
Explaining software fault predictions to spreadsheet users40
Challenges and opportunities: Implementing diversity and inclusion in software engineering university level education in Finland39
VeriFix: Verifying your fix towards an atomicity violation38
A data-driven active learning approach to reusing ML solutions in scientific applications37
Improve cross-project just-in-time defect prediction with dynamic transfer learning37
Flexible control flow graph alignment for delivering data-driven feedback to novice programming learners37
Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding36
Code search engines for the next generation36
Development of an automatic class diagram generator using an AI-based GRU classification model and 5W1H heuristic rules35
Combine sliced joint graph with graph neural networks for smart contract vulnerability detection35
A speech-enabled virtual assistant for efficient human–robot interaction in industrial environments35
A comprehensive empirical investigation on failure clustering in parallel debugging34
Proactive self-adaptation and assurance of explainable Human–Machine Teaming34
Advancing modern code review effectiveness through human error mechanisms33
An evidence-based roadmap for IoT software systems engineering33
BEACon-TD: Classifying Technical Debt and its types across diverse software projects issues using transformers32
When traceability goes awry: An industrial experience report32
Examining the impact of bias mitigation algorithms on the sustainability of ML-enabled systems: A benchmark study32
DLAP: A Deep Learning Augmented Large Language Model Prompting framework for software vulnerability detection32
VIBE: Looking for Variability In amBiguous rEquirements32
Examining the effect of software professionals’ personality & additional capabilities on agile teams’ climate31
Taxonomy of security weaknesses in Java and Kotlin Android apps31
DValidator: An approach for validating dependencies in build configurations30
Software engineering competency models and intercultural communication competencies: A systematic literature review29
Continuous software security through security prioritisation meetings29
A sampling-based online Co-Location-Resistant Virtual Machine placement strategy29
Pragmatic random sampling of Kconfig-based systems: A unified approach28
Understanding the low inter-rater agreement on aggressiveness on the Linux Kernel Mailing List27
Data catalog tools: A systematic multivocal literature review27
SynthoMinds: Bridging human programming intuition with retrieval, analogy, and reasoning in program synthesis27
Architecting ML-enabled systems: Challenges, best practices, and design decisions27
Navigating the DevOps landscape27
Exploring multi-programming-language commits and their impacts on software quality: An empirical study on Apache projects26
CharM — Evaluating a model for characterizing service-based architectures26
A proposal and assessment of an improved heuristic for the Eager Test smell detection26
Survey of annotation generators for deductive verifiers26
Editorial of the special issue on Quality in Software Architecture25
Correctness and security analysis of the protection in transit (PIT) protocol25
OREO: A tool-supported approach for offline run-time monitoring and fault–error–failure chain localization25
Fault analysis in additive manufacturing: Identifying causes of three-dimensional printer faults using machine learning and large language models25
Automatic modelling and verification of Autosar architectures25
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction25
Transformation-based model checking temporal trust in multi-agent systems24
End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers24
Design for dependability — State of the art and trends24
A critical comparison on six static analysis tools: Detection, agreement, and precision24
Variability management and software product line knowledge in software companies24
Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM24
An empirical study on the performance overhead of code instrumentation in containerised microservices24
Work-from-home is here to stay: Call for flexibility in post-pandemic work policies23
Architectural tactics to achieve quality attributes of machine-learning-enabled systems: a systematic literature review23
Deriving modernity signatures of codebases with static analysis23
Editorial Board23
BinCoFer: Three-stage purification for effective C/C++ binary third-party library detection23
Editorial Board23
SARG: Software application resiliency prediction using graph neural networks23
Choosing the right path for AI integration in engineering companies: A strategic guide23
A bot identification model and tool based on GitHub activity sequences23
Software product lines and features from the perspective of set theory with an application to feature location23
MPLinker: Multi-template Prompt-tuning with adversarial training for Issue–commit Link recovery22
BlockSOP: A blockchain-based software management platform for open collaborative development22
Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach22
Boosting source code suggestion with self-supervised Transformer Gated Highway22
Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode22
Connecting systems engineering and domain expertise through a toolchain: A simulation-integrated MBSE approach22
A structural taxonomy for lifted software product line analyses22
Integration test order generation based on reinforcement learning considering class importance22
From attack descriptions to vulnerabilities: A sentence transformer-based approach22
HiFlaky: Hierarchy-aware flakiness classification21
The pipeline for the continuous development of artificial intelligence models—Current state of research and practice21
Assessing the capability of android dynamic analysis tools to combat anti-runtime analysis techniques21
Semantic interoperability for an AI-based applications platform for smart hospitals using HL7 FHIR21
Empirical pathways to developer experience: A facet-based synthesis of empirical designs and guidelines21
Extracting goal models from natural language requirement specifications21
Do code reviews lead to fewer code smells?21
On the use of unsupervised machine learning for classification of crowd-based software requirements20
Developers’ need for the rationale of code commits: An in-breadth and in-depth study20
Multivocal study on microservice dependencies20
BugMentor: Generating answers to follow-up questions from software bug reports using structured information retrieval and neural text generation20
Retriever: A view-based approach to reverse engineering software architecture models20
Editorial Board20
Incremental-concurrent fusion checking for efficient context consistency20
On the evolution of agile software team work arrangements19
GDFuzz: An efficient directed fuzzing method based on XAI19
On the relationship between source-code metrics and cognitive load: A systematic tertiary review19
Incentive mechanism for mobile crowd sensing with Assumed Bid Cost Reverse Auction19
Automatic prediction of developers’ resolutions for software merge conflicts19
UX-work related needs in software startups: Diagnosis and resolution19
Machine learning approaches for automated software traceability: A systematic literature review19
The AmbiTRUS framework for identifying potential ambiguity in user stories19
Supporting meta-model-based language evolution and rapid prototyping with automated grammar transformation18
UVL: Feature modelling with the Universal Variability Language18
Code beauty is in the eye of the beholder: Exploring the relation between code beauty and quality18
A cloud-based data processing and visualization pipeline for the fibre roll-out in Germany18
Decentralized decision-making and scaled autonomy at Spotify18
Software refactoring research with large language models: A systematic literature review18
Do comments and expertise still matter? An experiment on programmers’ adoption of AI-generated JavaScript code18
An empirical investigation into the capabilities of anomaly detection approaches for test smell detection18
A/B testing: A systematic literature review18
Systematic literature review on software code smell detection approaches18
Automated end-to-end testing for conversational agents17
ExTrA: Explaining architectural design tradeoff spaces via dimensionality reduction17
Developing and sustaining a student-driven software solutions center—An experience report17
Why do women pursue a Ph.D. in Computer Science?17
L17
Just-in-time software vulnerability detection: Are we there yet?17
An empirical evaluation of static, dynamic, and hybrid slicing of WebAssembly binaries17
On the impact of single and co-occurrent refactorings on quality attributes in android applications17
Runtime reliability fractional distribution change analytics against cloud-based systems DDoS attacks17
Editorial Board17
A Cross-Domain Systematic Mapping Study on Software Engineering for Digital Twins17
An empirical evaluation of quasi-static executable slices16
Software engineering education: Results from a training intervention based on SonarCloud when developing web apps16
A systematic literature review on benchmarks for evaluating debugging approaches16
A white-box prompt injection attack on embodied AI agents driven by large language models16
Beyond code: Is there a difference between comments in visual and textual languages?16
Runtime composition in dynamic system of systems: A systematic review of challenges, solutions, tools, and evaluation methods16
Mapping the structure and evolution of software testing research over the past three decades16
How can feature usage be tracked across product variants? Implicit Feedback in Software Product Lines16
CubeAgent: Efficient query-based video adversarial examples generation through deep reinforcement learning16
Adaptive robustness evaluation for complex system prognostics and health management software platform16
Automated functional and robustness testing of microservice architectures16
Machine learning for software aging detection: A systematic mapping study16
Hierarchical tree-based algorithms for efficient expression parsing and test sequence generation in software models15
Barriers to device longevity and reuse: A vintage device empirical study15
DigBug—Pre/post-processing operator selection for accurate bug localization15
Input sensitivity on the performance of configurable systems an empirical study15
Refactoring react-based Web apps15
People want reassurance when making privacy-related decisions — Not technicalities15
Test scenario generation for feature-based context-oriented software systems15
Performability evaluation of NoSQL-based storage systems15
EnseSmells : Deep ensemble and programming language models for automated code smells detection14
Modeling and verifying resources and capabilities of ubiquitous scenarios for Unmanned Aerial Vehicle swarm14
Organizational factors of software performance testing for systems of systems: A case study using high-reliability organization theory to understand an outage14
The qualitative factor in software testing: A systematic mapping study of qualitative methods14
Collection skeletons: Declarative abstractions for data collections14
An architecture for model-based and intelligent automation in DevOps14
Product lines of dataflows14
Benchmarking scalability of stream processing frameworks deployed as microservices in the cloud14
SCGRU: A general approach for identifying multiple classes of self-admitted technical debt with text generation oversampling14
Understanding practitioners’ challenges and requirements in the design, implementation, and evaluation of anti-phishing interventions14
Software engineering team project courses with industrial customers: Students’ insights on challenges and lessons learned14
EdgeWorkflow: One click to test and deploy your workflow applications to the edge14
On the relation of method popularity to breaking changes in the Maven ecosystem13
Impermanent identifiers: Enhanced source code comprehension and refactoring13
Mutation testing of PL/SQL programs13
Editorial Board13
Rethinking data selection strategies for more accurate software effort prediction using the ISBSG dataset13
Editorial Board13
Editorial Board13
Software modernization powered by dynamic language product lines13
Model-driven safety and security co-analysis: A systematic literature review13
Refactoring cross-project code duplication in an industrial software product line: A case study from RDW13
FSECAM: A contextual thematic approach for linking feature to multi-level software architectural components13
CIT-daily: A combinatorial interaction testing-based daily build process13
CSAT: Configuration structure-aware tuning for highly configurable software systems13
Missing standard features compared with similar apps? A feature recommendation method based on the knowledge from user interface13
Assessing UML diagrams by GPT: Implications for education12
Predicting test failures induced by software defects: A lightweight alternative to software defect prediction and its industrial application12
CoDEvo: Column family database evolution using model transformations12
Research artifacts in software engineering publications: Status and trends12
Secure and flexible message-based communication for mobile apps within and across devices12
Identifying concerns when specifying machine learning-enabled systems: A perspective-based approach12
A comparative analysis of ML techniques for bug report classification12
SuMo: A mutation testing approach and tool for the Ethereum blockchain12
Is our chatbot telling lies? Assessing correctness of an LLM-based Dutch support chatbot12
So much more than test cases – An industrial study on testing of software units and components12
The life of software features: An exploratory case study of 189 feature requests in Marlin12
An annotation-based approach for finding bugs in neural network programs12
Perceptions of the human and social factors that influence the productivity of software development teams in Colombia: A statistical analysis12
On the dependency heaviness of CRAN/Bioconductor ecosystem12
Assets in Software Engineering: What are they after all?12
Tailoring binary decision diagram compilation for feature models12
An efficient heuristic algorithm for software module clustering optimization12
On the outdatedness of workflows in the GitHub Actions ecosystem12
SGT: Aging-related bug prediction via semantic feature learning based on graph-transformer12
Exploring developer experience factors in software ecosystems11
Enhancing vulnerability repair through the extraction and matching of repair patterns11
Investigating acceptance behavior in software engineering—Theoretical perspectives11
The pragmatics of hybridity: A grounded theory of method integration in software engineering projects11
Demystifying issues, causes and solutions in LLM open-source projects11
Empathy models and software engineering — A preliminary analysis and taxonomy11
Automatically generating test cases for safety-critical software via symbolic execution11
TitleGen-FL: Quality prediction-based filter for automated issue title generation11
RETRACTED: AI-Driven Decision-Making in Healthcare Information Systems: A Comprehensive Review11
Mokav: Execution-driven differential testing with LLMs11
RobEthiChor: Automated context-aware ethics-based negotiation for autonomous robots11
Experimenting Architectural Patterns in Federated Learning Systems11
A model-based mode-switching framework based on security vulnerability scores11
GeQuPI: Quantum Program Improvement with Multi-Objective Genetic Programming11
Out of the BLEU: How should we assess quality of the Code Generation models?11
Ensemble Effort Estimation: An updated and extended systematic literature review11
Software engineering for quantum programming: How far are we?11
Towards structured semantic representation via hierarchical transformer network for software defect prediction11
Adaptive data quality scoring operations framework using drift-aware mechanism for industrial applications11
An Investigation of confusing code patterns in JavaScript11
A model-driven formal methods approach to software architectural security vulnerabilities specification and verification11
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java11
Shedding light on the dark side – A systematic literature review of the issues in agile software development methodology use11
WASMICO: Micro-containers in microcontrollers with WebAssembly11
Test case prioritization using partial attention11
Automatic creation of acceptance tests by extracting conditionals from requirements: NLP approach and case study10
Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study10
It all starts with structure: investigating learning dynamics in large-scale agile software development10
EISM: an interactive and collaborative approach for software modularization10
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness10
DEzzer: Efficient Fuzzing Mutation Scheduling Based on Differential Evolution10
A case study of gender and online team communication in Software Engineering Education10
On the evaluation of usability design guidelines for improving network monitoring tools interfaces10
Software product families from a phylogenetics perspective for video game content generation10
Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions10
0.043668031692505