Journal of Systems and Software

Papers
(The TQCC of Journal of Systems and Software is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Fault-tolerant scheduling and data placement for scientific workflow processing in geo-distributed clouds164
On misbehaviour and fault tolerance in machine learning systems140
Managing the changing understanding of benefits in software initiatives140
Uncovering gender gap in academia: A comprehensive analysis within the software engineering community103
Portfolio Evolution Analysis for SPL Scoping: Unveiling the dynamics with dedicated time-series dashboards95
EFACT: An External Function Auto-Completion Tool to strengthen static binary lifting92
Translating meaning representations to behavioural interface specifications76
Investigating end-users’ values in agriculture mobile applications development: An empirical study on Bangladeshi female farmers76
Editorial Board74
Different approaches for testing body sensor network applications72
Editorial Board65
Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets62
Usability inspection: Novice crowd inspectors versus expert59
Deep learning framework testing via hierarchical and heuristic model generation58
Why do builds fail?—A conceptual replication study58
Evolution patterns of software-architecture smells: An empirical study of intra- and inter-version smells57
Understanding participation and corporatization in service of diversity in free/libre and open source software development projects55
Introduction to the Special Issue on Source Code Analysis and Manipulation 201853
The effect of advice network connectedness on problem-solving competence among software developers48
A MILP model on coordinated coverage path planning system for UAV-ship hybrid team scheduling software47
A systematic literature review on Android-specific smells46
Prevalence, common causes and effects of technical debt: Results from a family of surveys with the IT industry45
GitHub repositories with links to academic papers: Public access, traceability, and evolution45
A survey on machine learning techniques applied to source code45
Machine learning based success prediction for crowdsourcing software projects44
The uphill journey of FaaS in the open-source community43
Data preparation for Deep Learning based Code Smell Detection: A systematic literature review40
On measuring coupling between microservices39
Mining user reviews of COVID contact-tracing apps: An exploratory analysis of nine European apps39
Feature models to boost the vulnerability management process38
ECCOLA — A method for implementing ethically aligned AI systems37
Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification36
Investigating the performance of personalized models for software defect prediction35
Conformance assessment of Architectural Design Decisions on API endpoint designs derived from domain models35
DLAP: A Deep Learning Augmented Large Language Model Prompting framework for software vulnerability detection35
Multi-granularity coverage criteria for deep reinforcement learning systems35
A speech-enabled virtual assistant for efficient human–robot interaction in industrial environments35
A modular metamodel and refactoring rules to achieve software product line interoperability34
A fuzzy logic-based quality model for identifying microservices with low maintainability34
Diverse title generation for Stack Overflow posts with multiple-sampling-enhanced transformer34
Taxonomy of security weaknesses in Java and Kotlin Android apps34
VIBE: Looking for Variability In amBiguous rEquirements33
When traceability goes awry: An industrial experience report33
Reproducibility of issues reported in stack overflow questions: Challenges, impact & estimation32
Flexible control flow graph alignment for delivering data-driven feedback to novice programming learners32
A data-driven active learning approach to reusing ML solutions in scientific applications32
Challenges and opportunities: Implementing diversity and inclusion in software engineering university level education in Finland31
Maximizing integrative learning in software development teams: A systematic review of key drivers and future research agenda31
Software micro-rejuvenation for Android mobile systems30
Improve cross-project just-in-time defect prediction with dynamic transfer learning30
Code search engines for the next generation30
Discovering boundary values of feature-based machine learning classifiers through exploratory datamorphic testing29
Runtime verification of train control systems with parameterized modal live sequence charts29
A comprehensive empirical investigation on failure clustering in parallel debugging28
A three-step hybrid specification approach to error prevention28
Explaining software fault predictions to spreadsheet users28
Advancing modern code review effectiveness through human error mechanisms27
A novel blockchain protocol for selecting microservices providers and auditing contracts27
A model-driven approach for continuous performance engineering in microservice-based systems27
Leveraging belief uncertainty for informed decision making in software product line evolution27
Automatically recognizing the semantic elements from UML class diagram images26
An evidence-based roadmap for IoT software systems engineering26
Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding26
End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers25
Combine sliced joint graph with graph neural networks for smart contract vulnerability detection25
Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM25
SynthoMinds: Bridging human programming intuition with retrieval, analogy, and reasoning in program synthesis24
Examining the effect of software professionals’ personality & additional capabilities on agile teams’ climate24
Architecting ML-enabled systems: Challenges, best practices, and design decisions24
Understanding the low inter-rater agreement on aggressiveness on the Linux Kernel Mailing List24
Exploring multi-programming-language commits and their impacts on software quality: An empirical study on Apache projects24
DValidator: An approach for validating dependencies in build configurations23
System quality and security certification in seven weeks: A multi-case study in Spanish SMEs23
A sampling-based online Co-Location-Resistant Virtual Machine placement strategy23
CharM — Evaluating a model for characterizing service-based architectures23
Variability management and software product line knowledge in software companies23
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction23
Survey of annotation generators for deductive verifiers22
Design for dependability — State of the art and trends22
Product metrics for spreadsheets—A systematic review22
Continuous software security through security prioritisation meetings21
Transformation-based model checking temporal trust in multi-agent systems21
A hybrid code representation learning approach for predicting method names21
Choosing the right path for AI integration in engineering companies: A strategic guide21
Do code reviews lead to fewer code smells?21
A deductive reasoning approach for database applications using verification conditions21
A critical comparison on six static analysis tools: Detection, agreement, and precision21
Work-from-home is here to stay: Call for flexibility in post-pandemic work policies21
Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach21
Automatic modelling and verification of Autosar architectures21
Navigating the DevOps landscape21
Editorial Board21
Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode20
MPLinker: Multi-template Prompt-tuning with adversarial training for Issue–commit Link recovery20
Integration test order generation based on reinforcement learning considering class importance20
Deriving modernity signatures of codebases with static analysis20
Extracting goal models from natural language requirement specifications20
Considerations and challenges for the adoption of open source components in software-intensive businesses20
Software product lines and features from the perspective of set theory with an application to feature location20
A parallel worklist algorithm and its exploration heuristics for static modular analyses20
Architectural tactics to achieve quality attributes of machine-learning-enabled systems: a systematic literature review20
SEXTAMT: A systematic map to navigate the wide seas of factors affecting expert judgment software estimates20
MeTeaM—A method for characterizing mature software metrics teams20
The pipeline for the continuous development of artificial intelligence models—Current state of research and practice19
How to identify class comment types? A multi-language approach for class comment classification19
A bot identification model and tool based on GitHub activity sequences19
A structural taxonomy for lifted software product line analyses19
GEML: A grammar-based evolutionary machine learning approach for design-pattern detection19
Boosting source code suggestion with self-supervised Transformer Gated Highway19
Semantic interoperability for an AI-based applications platform for smart hospitals using HL7 FHIR19
Supporting meta-model-based language evolution and rapid prototyping with automated grammar transformation18
A cloud-based data processing and visualization pipeline for the fibre roll-out in Germany18
Hippo: A formal-model execution engine to control and verify critical real-time systems18
On the relationship between source-code metrics and cognitive load: A systematic tertiary review18
Incremental-concurrent fusion checking for efficient context consistency18
Retriever: A view-based approach to reverse engineering software architecture models18
Runtime reliability fractional distribution change analytics against cloud-based systems DDoS attacks18
Targeting uncertainty in smart CPS by confidence-based logic18
The AmbiTRUS framework for identifying potential ambiguity in user stories17
Multivocal study on microservice dependencies17
L17
SeCNN: A semantic CNN parser for code comment generation17
Developers’ need for the rationale of code commits: An in-breadth and in-depth study17
Just-in-time software vulnerability detection: Are we there yet?16
On the impact of single and co-occurrent refactorings on quality attributes in android applications16
An empirical investigation into the capabilities of anomaly detection approaches for test smell detection16
Decentralized decision-making and scaled autonomy at Spotify16
A Cross-Domain Systematic Mapping Study on Software Engineering for Digital Twins16
ExTrA: Explaining architectural design tradeoff spaces via dimensionality reduction16
Automatic prediction of developers’ resolutions for software merge conflicts15
Fast and accurate incremental feedback for students’ software tests using selective mutation analysis15
A/B testing: A systematic literature review15
Adaptive robustness evaluation for complex system prognostics and health management software platform15
Beyond code: Is there a difference between comments in visual and textual languages?15
Performability evaluation of NoSQL-based storage systems15
Developing and sustaining a student-driven software solutions center—An experience report15
Barriers to device longevity and reuse: A vintage device empirical study15
Refactoring react-based Web apps15
Hierarchical tree-based algorithms for efficient expression parsing and test sequence generation in software models15
Editorial Board15
Special Issue on Software and Systems Reuse in the Big Data Era15
How can feature usage be tracked across product variants? Implicit Feedback in Software Product Lines15
Software engineering education: Results from a training intervention based on SonarCloud when developing web apps14
Test scenario generation for feature-based context-oriented software systems14
People want reassurance when making privacy-related decisions — Not technicalities14
DigBug—Pre/post-processing operator selection for accurate bug localization14
SCGRU: A general approach for identifying multiple classes of self-admitted technical debt with text generation oversampling14
Collection skeletons: Declarative abstractions for data collections14
Automated functional and robustness testing of microservice architectures14
A systematic literature review on benchmarks for evaluating debugging approaches14
CONSERVE: A framework for the selection of techniques for monitoring containers security14
A ground-truth dataset and classification model for detecting bots in GitHub issue and PR comments14
Input sensitivity on the performance of configurable systems an empirical study14
Benchmarking scalability of stream processing frameworks deployed as microservices in the cloud13
An empirical evaluation of static, dynamic, and hybrid slicing of WebAssembly Binaries13
EdgeWorkflow: One click to test and deploy your workflow applications to the edge13
Mapping the structure and evolution of software testing research over the past three decades13
SuMo: A mutation testing approach and tool for the Ethereum blockchain13
CoDEvo: Column family database evolution using model transformations13
Tuning configuration of apache spark on public clouds by combining multi-objective optimization and performance prediction model13
An empirical evaluation of quasi-static executable slices13
An architecture for model-based and intelligent automation in DevOps13
Profiling gas consumption in solidity smart contracts13
Editorial Board12
Predicting test failures induced by software defects: A lightweight alternative to software defect prediction and its industrial application12
On the dependency heaviness of CRAN/Bioconductor ecosystem12
CSAT: Configuration structure-aware tuning for highly configurable software systems12
So much more than test cases – an industrial study on testing of software units and components12
On the outdatedness of workflows in the GitHub Actions ecosystem12
Model-driven safety and security co-analysis: A systematic literature review12
Product lines of dataflows12
Software modernization powered by dynamic language product lines12
Missing standard features compared with similar apps? A feature recommendation method based on the knowledge from user interface12
FSECAM: A contextual thematic approach for linking feature to multi-level software architectural components12
CIT-daily: A combinatorial interaction testing-based daily build process12
An efficient heuristic algorithm for software module clustering optimization12
Editorial Board12
On the relation of method popularity to breaking changes in the Maven ecosystem12
Research artifacts in software engineering publications: Status and trends12
Mutation testing of PL/SQL programs12
Impermanent identifiers: Enhanced source code comprehension and refactoring12
Organizational Factors of Software Performance Testing for Systems of Systems: A Case Study Using High-Reliability Organization Theory to Understand an Outage12
Model-based testing in practice: An experience report from the web applications domain12
Feature-based software design pattern detection12
Assets in Software Engineering: What are they after all?12
Agile elicitation of scalability requirements for open systems: A case study11
An empirical study of COVID-19 related posts on Stack Overflow: Topics and technologies11
A model-based mode-switching framework based on security vulnerability scores11
An annotation-based approach for finding bugs in neural network programs11
Automatically generating test cases for safety-critical software via symbolic execution11
Adaptive data quality scoring operations framework using drift-aware mechanism for industrial applications11
SGT: Aging-related bug prediction via semantic feature learning based on graph-transformer11
Identifying concerns when specifying machine learning-enabled systems: A perspective-based approach11
An analysis of open source software licensing questions in Stack Exchange sites11
An Investigation of confusing code patterns in JavaScript11
Software engineering for quantum programming: How far are we?11
A model-driven formal methods approach to software architectural security vulnerabilities specification and verification11
Improving test case selection by handling class and attribute noise11
Perceptions of the human and social factors that influence the productivity of software development teams in Colombia: A statistical analysis11
Ensemble Effort Estimation: An updated and extended systematic literature review11
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java11
An empirical characterization of event sourced systems and their schema evolution — Lessons from industry11
Investigating acceptance behavior in software engineering—Theoretical perspectives10
Symbolic testing of floating-point bugs and exceptions10
FollowMe@LS: Electricity price and source aware resource management in geographically distributed heterogeneous datacenters10
BIT: A template-based approach to incremental and bidirectional model-to-text transformation10
TitleGen-FL: Quality prediction-based filter for automated issue title generation10
Shedding light on the dark side – A systematic literature review of the issues in agile software development methodology use10
Test case prioritization using partial attention10
The influence of the city metaphor and its derivates in software visualization10
GeQuPI: Quantum Program Improvement with Multi-Objective Genetic Programming10
DeepKernel: 2D-kernels clustering based mutant reduction for cost-effective deep learning model testing10
Empathy models and software engineering — A preliminary analysis and taxonomy10
AI-Driven Decision-Making in Healthcare Information Systems: A Comprehensive Review10
Out of the BLEU: How should we assess quality of the Code Generation models?10
Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions10
WASMICO: Micro-containers in microcontrollers with WebAssembly10
FaaSten your decisions: A classification framework and technology review of function-as-a-Service platforms10
Secure and flexible message-based communication for mobile apps within and across devices10
The Prevent-Model: Human and Organizational Factors Fostering Engineering of Safe and Secure Robotic Systems9
Towards a common data-driven culture: A longitudinal study of the tensions and emerging solutions involved in becoming data-driven in a large public sector organization9
RepliComment: Identifying clones in code comments9
API beauty is in the eye of the clients: 2.2 million Maven dependencies reveal the spectrum of client–API usages9
Adaptive distributed monitors of spatial properties for cyber–physical systems9
Random or heuristic? An empirical study on path search strategies for test generation in KLEE9
DongTing: A large-scale dataset for anomaly detection of the Linux kernel9
Microservice architecture recovery based on intra-service and inter-service features9
Trace matrix optimization for fault localization9
MicroFog: A framework for scalable placement of microservices-based IoT applications in federated Fog environments9
An empirical study of software architecture resilience evaluation methods9
TOSCAdata: Modeling data pipeline applications in TOSCA9
Effective software security enhancement using an improved PointNet++9
On the evaluation of usability design guidelines for improving network monitoring tools interfaces9
Model-based safety engineering for autonomous train map9
Log statements generation via deep learning: Widening the support provided to developers9
A systematic review on security and safety of self-adaptive systems9
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness9
Towards cost-efficient vulnerability detection with cross-modal adversarial reprogramming9
Processes, methods, and tools in model-based engineering—A qualitative multiple-case study9
Automated identification of security discussions in microservices systems: Industrial surveys and experiments9
Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study9
Automatic creation of acceptance tests by extracting conditionals from requirements: NLP approach and case study9
Changes in perceived productivity of software engineers during COVID-19 pandemic: The voice of evidence9
Understanding Virtual Onboarding Dynamics and Developer Turnover Intention in the Era of Pandemic9
IADA: A dynamic interference-aware cloud scheduling architecture for latency-sensitive workloads9
0.091457843780518