Information and Software Technology

Papers
(The median citation count of Information and Software Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation289
What do developers consider magic literals? A smalltalk perspective254
A Delphi study to recognize and assess systems of systems vulnerabilities193
CADV: A software visualization approach for code annotations distribution160
Burnout in software engineering: A systematic mapping study120
Recruiting credible participants for field studies in software engineering research110
Feature-based insight for forks in social coding platforms103
Automatically inferring user behavior models in large-scale web applications101
A vulnerability detection framework by focusing on critical execution paths90
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks73
A systematic review of shared personal informatics69
Finding the best learning to rank algorithms for effort-aware defect prediction69
Early prediction for merged vs abandoned code changes in modern code reviews68
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks59
Research artifacts in secondary studies: A systematic mapping in software engineering58
GNPSum: A code summarization enhancement framework based on Graph Node Position53
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains53
Vulnerability detection with Graph Attention Network and Metric Learning50
Exploring continual learning in code intelligence with domain-wise distilled prompts50
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation50
A survey of coverage-guided greybox fuzzing with deep neural models47
A systematic literature review of agile software development projects47
Improved measurement of software development effort estimation bias46
Leveraging execution traces to enhance traceability links recovery in BPMN models45
A model-driven approach to reengineering processes in cloud computing42
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning41
Warnings: Violation symptoms indicating architecture erosion40
An exploratory study of bug prediction at the method level39
A hybrid model for efficient decision-making in self-adaptive systems39
Context2Vector: Accelerating security event triage via context representation learning39
Editorial Board37
Threats to validity in software engineering research: A critical reflection37
Ambiguity in user stories: A systematic literature review36
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems35
An end-to-end deep learning system for requirements classification using recurrent neural networks34
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications34
CSJSS: Augmenting code summarization with joint structural semantic of abstract syntax trees34
Exploring the use of LLMs for the selection phase in systematic literature studies34
Introduction to software architecture for quantum computing systems special issue33
Detecting privacy requirements from User Stories with NLP transfer learning models33
Requirements engineering for older adult digital health software: A systematic literature review33
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing32
A survey of selected characteristics and contexts of the analysis and planning phase of software development projects and their connections to project success32
A multi-objective agile project planning model and a comparative meta-heuristic approach32
Comparison of multi-criteria decision-making methods for online controlled experiments in a launch decision-making framework32
Prioritisation of code clones using a genetic algorithm31
Editorial Board30
Editorial Board30
Editorial Board30
Graph-based code semantics learning for efficient semantic code clone detection30
An empirical study of emoji use in software development communication29
Towards automating self-admitted technical debt repayment29
To group or not to group? Group sizes for requirements elicitation29
An alternative to code comment generation? Generating comment from bytecode28
Graph-based explainable vulnerability prediction27
Test Code Flakiness in Mobile Apps: The Developer’s Perspective27
A brief note, with thanks, on the contributions of Guenther Ruhe27
Coverage-enhanced fault diagnosis for Deep Learning programs: A learning-based approach with hybrid metrics27
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm26
Investigating replication challenges through multiple replications of an experiment26
Automatically repairing tensor shape faults in deep learning programs26
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?25
Personalizing label prediction for GitHub issues25
Dev2vec: Representing domain expertise of developers in an embedding space25
Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations25
Towards a taxonomy of code review smells24
UX Research practices related to Long-Term UX: A Systematic Literature Review24
Developers’ viewpoints to avoid bug-introducing changes24
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security24
Short communication: Evolution of secondary studies in software engineering24
An exploratory study of software artifacts on GitHub from the lens of documentation24
Community smells—The sources of social debt: A systematic literature review23
Causal reasoning in Software Quality Assurance: A systematic review23
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement23
FCTree: Visualization of function calls in execution22
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines22
A low-code assessment platform for urban digital twins22
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation22
A systematic mapping study on graph machine learning for static source code analysis22
Improving effort-aware defect prediction by directly learning to rank software modules22
Introduction to the special issue on managing software processes using soft computing techniques21
A mixed method study of DevOps challenges21
Overlapping community detection in software ecosystem based on pheromone guided personalized PageRank algorithm21
Introduction to the Special Issue on: Grey Literature and Multivocal Literature Reviews (MLRs) in software engineering21
Skills development for software engineers: Systematic literature review21
An expressive and modular layer activation mechanism for Context-Oriented Programming21
Impact of software development processes on the outcomes of student computing projects: A tale of two universities21
Microservice-based projects in agile world: A structured interview21
MT-Nod: Metamorphic testing for detecting non-optimal decisions of autonomous driving systems in interactive scenarios20
Cross-Modal Retrieval-enhanced code Summarization based on joint learning for retrieval and generation20
Genetic model-based success probability prediction of quantum software development projects20
FRL-MFPG: Propagation-aware fault root cause location for microservice intelligent operation and maintenance20
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success19
Data preprocessing for machine learning based code smell detection: A systematic literature review19
Investigating the relationship between coordination strategy and coordination effectiveness in agile software development projects19
A taxonomy of microservice integration techniques19
Dynamic robustness evaluation for automated model selection in operation19
A survey on Cryptoagility and Agile Practices in the light of quantum resistance19
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method19
A joint optimization approach for bug triage leveraging individual ability and collective responsibility of developers19
Layered microservices architecture: A multitree-based domain-driven approach19
Editorial Board19
Application of knowledge graph in software engineering field: A systematic literature review19
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing19
An information theoretic notion of software testability18
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies18
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants18
Editorial Board18
The impact of knowledge inertia on process tailoring in the dynamic development of software projects in Chinese industries18
Does it smell? A homogeneous stacking approach for code smell prediction18
Editorial Board18
A random forest model for early-stage software effort estimation for the SEERA dataset18
Editorial Board18
MLOps best practices, challenges and maturity models: A systematic literature review18
On the use of contextual information for machine learning based test case prioritization in continuous integration development17
An exploratory study of sustaining organisational agility17
The journey to technical excellence in agile software development17
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning17
Detection of code smells in react with TypeScript applications17
When should we (not) use the mean magnitude of relative error (MMRE) as an error measure in software development effort estimation?17
A software vulnerability detection method based on multi-modality with unified processing17
JIT-CF: Integrating contrastive learning with feature fusion for enhanced just-in-time defect prediction17
Psychological safety in software workplaces: A systematic literature review17
Exploring the means to measure explainability: Metrics, heuristics and questionnaires17
Integrating DSGEO into test case generation for path coverage of MPI programs16
Editorial Board16
Antecedents of psychological safety in agile software development teams16
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics16
Editorial Board16
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information16
Studying the challenges of developing hardware description language programs16
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?15
A software product line approach for developing hybrid software systems15
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review15
Does it matter who pays back Technical Debt? An empirical study of self-fixed TD15
SE3M: A model f15
Reinforcement learning for test case prioritization based on LLEed K-means clustering and dynamic priority factor15
Information and software technology: Special section on techdebt 202115
Case study identification: A trivial indicator outperforms human classifiers15
Making vulnerability prediction more practical: Prediction, categorization, and localization15
Multi-source cross-domain vulnerability detection based on code pre-trained model15
Are your apps accessible? A GCN-based accessibility checker for low vision users15
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities15
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network15
Towards antifragility of cloud systems: An adaptive chaos driven framework14
A systematic literature review of capstone courses in software engineering14
A multiple case study on reuse in Game Software Engineering14
Assessing and improving syntactic adversarial robustness of pre-trained models for code translation14
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network14
Preventing technical debt with the TAP framework for Technical Debt Aware Management14
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review14
The yea-paradox: Cognitive bias in technology acceptance surveys14
Studying logging practice in machine learning-based applications14
Service Design Handover to user experience design – a systematic literature review14
Context-based statement-level vulnerability localization14
The need for more informative defect prediction: A systematic literature review14
Editorial Board14
Uncertainty propagation from sensor data to deep learning models in autonomous driving13
Like, dislike, or just do it? How developers approach software development tasks13
Speeding up constraint-based program repair using a search-based technique13
Negative effects of gamification in education software: Systematic mapping and practitioner perceptions13
Memorization and generalization in neural code intelligence models13
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling13
How far are we from reproducible research on code smell detection? A systematic literature review13
Successful combination of database search and snowballing for identification of primary studies in systematic literature studies13
Test case recommendation based on balanced distance of test targets13
“Won’t We Fix this Issue?” Qualitative characterization and automated identification of wontfix issues on GitHub13
UCD-LLM: A use case diagram requirement modeling multi-agent framework with large language model13
Predicting the precise number of software defects: Are we there yet?12
Double-counting in software engineering tertiary studies — An overlooked threat to validity12
A search-based framework for automatic generation of testing environments for cyber–physical systems12
Editorial Board12
Data migration for column family database evolution12
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding12
Introduction to the Special Section on the Best Papers from REFSQ 202212
Transparency and explainability of AI systems: From ethical guidelines to requirements12
How do software practitioners perceive human-centric defects?12
A systematic mapping study of bug reproduction and localization12
An empirical study on capability of Large Language Models in understanding code semantics12
An empirical study on self-admitted technical debt in modern code review12
An empirical study on ML DevOps adoption trends, efforts, and benefits analysis12
Native cross-platform app development using the SequalsK transpiler12
Understanding the product knowledge acquisition process in multiprovider software evolution scenarios: An exploratory study12
SHSE: A subspace hybrid sampling ensemble method for software defect number prediction11
Dealing with imbalanced data for interpretable defect prediction11
Unveiling security weaknesses in autonomous driving systems: An in-depth empirical study11
Fine-tuning and prompt engineering for large language models-based code review automation11
Case study identification with GPT-4 and implications for mapping studies11
CLeBPI: Contrastive Learning for Bug Priority Inference11
Don’t settle for the first! How many GitHub Copilot solutions should you check?11
Editorial Board11
Information needs and presentation in agile software development11
Machine translation-based fine-grained comments generation for solidity smart contracts11
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code11
Reporting case studies in systematic literature studies—An evidential problem11
Why and how do organizations create user-led open source consortia? A systematic literature review11
Introduction to the special issue on dependable systems and applications11
Many-objective optimization of non-functional attributes based on refactoring of software models10
Copiloting the future: How generative AI transforms Software Engineering10
Trust, transparency, and adoption in generative AI for software engineering: Insights from Twitter discourse10
How do practitioners gain confidence in assurance cases?10
Probabilistic program performance analysis with confidence intervals10
The discovery effort worthiness index: How much product discovery should you do and how can this be integrated into delivery?10
Guidelines for the development of a critical software under emergency10
Issues-Driven features for software fault prediction10
Beyond hard vs. soft: A mixed-methods approach to developing a competency model for E-commerce software engineers10
SENEM: A software engineering-enabled educational metaverse10
Editorial Board10
Code review guidelines for GUI-based testing artifacts10
Job satisfaction in agile information systems development: A stakeholder perspective10
The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering10
Visualizations for the evolution of Variant-Rich Systems: A systematic mapping study10
Relating team atmosphere and group dynamics to student software development teams’ performance10
Gamification applied to knowledge sharing in software development: A rapid review10
Understanding how early-stage researchers leverage socio-technical affordances for distributed research support10
On preserving the behavior in software refactoring: A systematic mapping study10
Progress on class integration test order generation approaches: A systematic literature review10
An investigation of causes and effects of trust in Boundary Artefacts10
An empirical study on secure usage of mobile health apps: The attack simulation approach10
A longitudinal study on the temporal validity of software samples9
Application of Project-Based Learning to a Software Engineering course in a hybrid class environment9
Special issue on causal modeling and inference in SE9
Binary and multi-class classification of Self-Admitted Technical Debt: How far can we go?9
A deep learning-based automated framework for functional User Interface testing9
Enabling efficient and low-effort decentralized federated learning with the EdgeFL framework9
Using clarification questions to improve software developers’ Web search9
A unifying framework for the systematic analysis of Git workflows9
The lifecycle of Technical Debt that manifests in both source code and issue trackers9
A Systematic Literature Review on prioritizing software test cases using Markov chains9
Social capital in large-scale agile software product management: A multi-case study9
RoseMatcher: Identifying the impact of user reviews on app updates9
The impact of using biased performance metrics on software defect prediction research9
Impact of minimum viable product on software ecosystem failure9
Integrating energy consumption in the development of serverless applications9
Predicting vulnerability inducing function versions using node embeddings and graph neural networks9
An onboarding model for integrating newcomers into agile project teams9
Search-based approaches to optimizing software product line architectures: A systematic literature review9
A socio-technical perspective on software vulnerabilities: A causal analysis9
A study of Scrum @ S&P Global in the post-COVID-19 era: Unsuitable for remote work or just flawed implementation?9
Aligned metric representation based balanced multiset ensemble learning for heterogeneous defect prediction9
Inferring data model from service interactions for response generation in service virtualization9
Squeeziness for non-deterministic systems9
Improving domain-specific neural code generation with few-shot meta-learning9
Programming language implementations for context-oriented self-adaptive systems9
Crowdsourced test report prioritization considering bug severity8
MDSSED: A safety and security enhanced model-driven development approach for smart home apps8
Classifying issue reports according to feature descriptions in a user manual based on a deep learning model8
A modeling assistant to manage technical debt in coupled evolution8
Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 291008
Making existing software quantum safe: A case study on IBM Db28
0.049968957901001