Information and Software Technology

Papers
(The median citation count of Information and Software Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation412
A systematic review of shared personal informatics334
Uncovering challenges of cybersecurity cross-regulation in EU legislation284
A vulnerability detection framework by focusing on critical execution paths250
Finding the best learning to rank algorithms for effort-aware defect prediction133
Recruiting credible participants for field studies in software engineering research131
CADV: A software visualization approach for code annotations distribution96
Unsupervised, robust, and lightweight detection of data pattern anomalies and outliers94
Burnout in software engineering: A systematic mapping study92
Metamorphic Testing of Multimodal Human Trajectory Prediction90
LocVul: Line-level vulnerability localization based on a Sequence-to-Sequence approach88
Gamified or Glorified? A systematic review of serious games for security & privacy in the SDLC85
What do developers consider magic literals? A smalltalk perspective79
Taxonomy of Cybersecurity Challenges and Solutions for the Superintelligent Systems77
A Delphi study to recognize and assess systems of systems vulnerabilities70
User-centric requirements prioritization in mHealth applications: Insights from a Discrete Choice Experiment62
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks59
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains57
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks57
Leveraging execution traces to enhance traceability links recovery in BPMN models56
Context2Vector: Accelerating security event triage via context representation learning55
EdgeSim: Firmware vulnerability detection with control transfer-enhanced binary code similarity detection53
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning51
GNPSum: A code summarization enhancement framework based on Graph Node Position51
Warnings: Violation symptoms indicating architecture erosion48
Exploring continual learning in code intelligence with domain-wise distilled prompts45
A survey of coverage-guided greybox fuzzing with deep neural models45
Improved measurement of software development effort estimation bias44
Editorial Board43
Ambiguity in user stories: A systematic literature review42
Research artifacts in secondary studies: A systematic mapping in software engineering42
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications41
Vulnerability detection with Graph Attention Network and Metric Learning39
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation38
An end-to-end deep learning system for requirements classification using recurrent neural networks37
A hybrid model for efficient decision-making in self-adaptive systems37
A systematic literature review of agile software development projects37
CSJSS: Augmenting code summarization with joint structural semantic of abstract syntax trees37
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems37
VulATMHD: Joint adaptive triplet mining and hybrid distillation for type-aware vulnerability classification37
Threats to validity in software engineering research: A critical reflection36
Exploring the use of LLMs for the selection phase in systematic literature studies36
Introduction to software architecture for quantum computing systems special issue34
Representation-based fairness evaluation and bias correction robustness assessment in neural networks34
A survey of selected characteristics and contexts of the analysis and planning phase of software development projects and their connections to project success33
Accelerating similarity-based model matching with subtree equivalence33
Requirements engineering for older adult digital health software: A systematic literature review32
Towards automating self-admitted technical debt repayment31
Comparison of multi-criteria decision-making methods for online controlled experiments in a launch decision-making framework31
Detecting privacy requirements from User Stories with NLP transfer learning models31
Editorial Board30
Editorial Board30
An empirical study of emoji use in software development communication29
Editorial Board29
RLSPL: A software product line for streamlining reinforcement learning project development28
An alternative to code comment generation? Generating comment from bytecode28
Prioritisation of code clones using a genetic algorithm27
Test Code Flakiness in Mobile Apps: The Developer’s Perspective27
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing27
A method for real-world privacy-preserving Android malware detection through Federated Machine Learning27
Broadening software value from technical to management perspectives: a stakeholder-driven exploration using a modified-Delphi approach26
Gated transformer network for multivariate security patch identification with mixture-of-experts26
A multi-objective agile project planning model and a comparative meta-heuristic approach25
To group or not to group? Group sizes for requirements elicitation25
Graph-based code semantics learning for efficient semantic code clone detection25
AntiPhishX: An AI-driven service-oriented ensemble framework for detecting phishing and ai-powered phishing attacks25
Best practices for work from home: A qualitative survey in open source and distributed software development24
Automatically repairing tensor shape faults in deep learning programs24
Coverage-enhanced fault diagnosis for Deep Learning programs: A learning-based approach with hybrid metrics24
Short communication: Evolution of secondary studies in software engineering24
Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations24
A brief note, with thanks, on the contributions of Guenther Ruhe24
UX Research practices related to Long-Term UX: A Systematic Literature Review24
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement23
Improving effort-aware defect prediction by directly learning to rank software modules23
An exploratory study of software artifacts on GitHub from the lens of documentation23
Investigating replication challenges through multiple replications of an experiment23
Community smells—The sources of social debt: A systematic literature review23
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security22
Dev2vec: Representing domain expertise of developers in an embedding space22
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm21
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation21
FRL-MFPG: Propagation-aware fault root cause location for microservice intelligent operation and maintenance21
Causal reasoning in Software Quality Assurance: A systematic review21
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?21
FCTree: Visualization of function calls in execution21
Personalizing label prediction for GitHub issues21
MT-Nod: Metamorphic testing for detecting non-optimal decisions of autonomous driving systems in interactive scenarios21
Fairness on a budget, across the board: A cost-effective evaluation of fairness-aware practices across contexts, tasks, and sensitive attributes21
Graph-based explainable vulnerability prediction21
Skills development for software engineers: Systematic literature review20
Overlapping community detection in software ecosystem based on pheromone guided personalized PageRank algorithm20
Edge AI assurance: A systematic mapping study20
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines20
A multi-criteria accessibility index for quantifying digital fairness in e-commerce20
A low-code assessment platform for urban digital twins20
A systematic mapping study on graph machine learning for static source code analysis20
Sustainability-aware reference architectures: Needs and future research directions20
An expressive and modular layer activation mechanism for Context-Oriented Programming20
Introduction to the special issue on managing software processes using soft computing techniques20
Microservice-based projects in agile world: A structured interview20
Genetic model-based success probability prediction of quantum software development projects19
Using LLMs to enhance code quality: A systematic literature review19
A mixed method study of DevOps challenges19
Towards green game software engineering: A comparative analysis of energy consumption between the widespread unity and unreal video game engines19
A model-driven approach for engineering Mobility Digital Twins: The Bologna case study19
Cross-Modal Retrieval-enhanced code Summarization based on joint learning for retrieval and generation19
Editorial Board18
A taxonomy of microservice integration techniques18
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method18
Editorial Board18
Editorial Board18
Layered microservices architecture: A multitree-based domain-driven approach18
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants18
Empirical analysis of generative AI tool adoption in software development18
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies17
A joint optimization approach for bug triage leveraging individual ability and collective responsibility of developers17
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success17
CSVD-AES: Cross-project software vulnerability detection based on active learning with metric fusion17
The impact of knowledge inertia on process tailoring in the dynamic development of software projects in Chinese industries17
Privacy by design: Aligning GDPR and software engineering specifications with a requirements engineering approach17
Pythonic vs Refactorable Pythonic: On the relationship between Pythonic idioms and code quality in machine learning projects17
Data preprocessing for machine learning based code smell detection: A systematic literature review17
A survey on Cryptoagility and Agile Practices in the light of quantum resistance17
A random forest model for early-stage software effort estimation for the SEERA dataset16
MLOps best practices, challenges and maturity models: A systematic literature review16
Detection of code smells in react with TypeScript applications16
JIT-CF: Integrating contrastive learning with feature fusion for enhanced just-in-time defect prediction16
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics16
Application of knowledge graph in software engineering field: A systematic literature review16
Does it smell? A homogeneous stacking approach for code smell prediction16
Investigating the relationship between coordination strategy and coordination effectiveness in agile software development projects16
Studying the challenges of developing hardware description language programs16
Multi-source cross-domain vulnerability detection based on code pre-trained model16
Dynamic robustness evaluation for automated model selection in operation16
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing16
Editorial Board16
Editorial Board16
On the use of contextual information for machine learning based test case prioritization in continuous integration development16
Editorial Board16
FairST: A novel approach for machine learning bias repair through latent sensitive attribute translation15
POSVIA: Inconsistency analyzer for open-source Proof-of-Concept reports15
Antecedents of psychological safety in agile software development teams15
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning15
Equitable cybersecurity: Towards generating requirements through the lens of security literacy15
VulSEG: Enhanced graph-based vulnerability detection system with advanced text embedding15
Integrating DSGEO into test case generation for path coverage of MPI programs15
An exploratory study of sustaining organisational agility15
MT4Image: An efficient metamorphic testing approach for image processing applications15
Requirements-driven analysis of variability in configurable software15
Exploring the means to measure explainability: Metrics, heuristics and questionnaires15
The journey to technical excellence in agile software development15
A software vulnerability detection method based on multi-modality with unified processing14
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information14
Are your apps accessible? A GCN-based accessibility checker for low vision users14
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network14
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?14
SE3M: A model f14
Towards antifragility of cloud systems: An adaptive chaos driven framework14
Psychological safety in software workplaces: A systematic literature review14
Case study identification: A trivial indicator outperforms human classifiers14
Service Design Handover to user experience design – a systematic literature review14
A multiple case study on reuse in Game Software Engineering13
Information and software technology: Special section on techdebt 202113
Context-based statement-level vulnerability localization13
Making vulnerability prediction more practical: Prediction, categorization, and localization13
MT-Boost: A metamorphic-testing based training method for enhancing the robustness of deep neural network classifiers13
VDMPAGR: A vulnerability detection model based on pointer analysis and graph representation13
Preventing technical debt with the TAP framework for Technical Debt Aware Management13
The need for more informative defect prediction: A systematic literature review13
A systematic literature review of capstone courses in software engineering13
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review13
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review13
Directed fuzzing based on path constraints and deviation path correction13
A software product line approach for developing hybrid software systems13
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network13
Reinforcement learning for test case prioritization based on LLEed K-means clustering and dynamic priority factor13
Editorial Board13
The yea-paradox: Cognitive bias in technology acceptance surveys13
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling12
UCD-LLM: A use case diagram requirement modeling multi-agent framework with large language model12
Like, dislike, or just do it? How developers approach software development tasks12
Test case recommendation based on balanced distance of test targets12
DeepRegion: Black-box efficient testing for DNNs based on region analysis12
Speeding up constraint-based program repair using a search-based technique12
Evaluating and improving LLM-based competitive program generation12
An extensible, feature-based framework for fine-grained code quality assessment12
Assessing and improving syntactic adversarial robustness of pre-trained models for code translation12
Studying logging practice in machine learning-based applications12
Uncertainty propagation from sensor data to deep learning models in autonomous driving12
Negative effects of gamification in education software: Systematic mapping and practitioner perceptions11
Editorial Board11
Transparency and explainability of AI systems: From ethical guidelines to requirements11
Case study identification with GPT-4 and implications for mapping studies11
Nez: A design-driven skeleton model for building continuum AI-based and analytic systems11
Memorization and generalization in neural code intelligence models11
How do software practitioners perceive human-centric defects?11
Introduction to the Special Section on the Best Papers from REFSQ 202211
Communication factors and practices in distributed software development projects11
Double-counting in software engineering tertiary studies — An overlooked threat to validity11
Successful combination of database search and snowballing for identification of primary studies in systematic literature studies11
Understanding the product knowledge acquisition process in multiprovider software evolution scenarios: An exploratory study11
Introduction to the special issue on dependable systems and applications11
Native cross-platform app development using the SequalsK transpiler11
Editorial Board10
Fine-tuning and prompt engineering for large language models-based code review automation10
Don’t settle for the first! How many GitHub Copilot solutions should you check?10
A systematic mapping study of bug reproduction and localization10
Dealing with imbalanced data for interpretable defect prediction10
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding10
CLeBPI: Contrastive Learning for Bug Priority Inference10
FAIR-CARE: A comparative evaluation of unfairness mitigation approaches10
Why and how do organizations create user-led open source consortia? A systematic literature review10
Editorial Board10
An empirical study on capability of Large Language Models in understanding code semantics10
An empirical study on ML DevOps adoption trends, efforts, and benefits analysis10
Information needs and presentation in agile software development10
Data migration for column family database evolution10
An empirical study on self-admitted technical debt in modern code review10
Visualizations for the evolution of Variant-Rich Systems: A systematic mapping study10
Reporting case studies in systematic literature studies—An evidential problem10
Editorial Board10
Predicting the precise number of software defects: Are we there yet?10
Machine translation-based fine-grained comments generation for solidity smart contracts10
Android malware detection by using graph optimization of static features based on pre-trained language models10
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code10
A search-based framework for automatic generation of testing environments for cyber–physical systems10
Beyond hard vs. soft: A mixed-methods approach to developing a competency model for E-commerce software engineers10
Integrating energy consumption in the development of serverless applications9
Using clarification questions to improve software developers’ Web search9
Copiloting the future: How generative AI transforms Software Engineering9
Speculation for RE: addressing unanticipated consequence9
A deep learning-based automated framework for functional User Interface testing9
Inferring data model from service interactions for response generation in service virtualization9
Locality-based security bug report identification via active learning9
Squeeziness for non-deterministic systems9
BERT- and TF-IDF-based feature extraction for long-lived bug prediction in FLOSS: A comparative study9
Enabling efficient and low-effort decentralized federated learning with the EdgeFL framework9
RoseMatcher: Identifying the impact of user reviews on app updates9
SENEM: A software engineering-enabled educational metaverse9
Progress on class integration test order generation approaches: A systematic literature review9
Relating team atmosphere and group dynamics to student software development teams’ performance9
Automated description generation for software patches9
Process mining software engineering practices: A case study for deployment pipelines9
Accuracy-fairness trade-off in ML for healthcare: A quantitative evaluation of bias mitigation strategies9
Issues-Driven features for software fault prediction9
Code review guidelines for GUI-based testing artifacts9
Gamification applied to knowledge sharing in software development: A rapid review9
Unveiling security weaknesses in autonomous driving systems: An in-depth empirical study9
A first and fast symbolic approach for data-aware business process compliance checking9
0.27715706825256