Information and Software Technology

Papers
(The TQCC of Information and Software Technology is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A comprehensive empirical evaluation of generating test suites for mobile applications with diversity157
QLSN: Quantum key distribution for large scale networks137
Metamorphic testing of chess engines135
Prioritizing code documentation effort: Can we do it simpler but better?129
Architectural design decisions that incur technical debt — An industrial case study78
Automated formalization of structured natural language requirements72
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks70
Machine learning for requirements engineering (ML4RE): A systematic literature review complemented by practitioners’ voices from Stack Overflow69
SE3M: A model f68
Lessons learned to improve the UX practices in agile projects involving data science and process automation63
Understanding and evaluating software reuse costs and benefits from industrial cases—A systematic literature review62
On the use of contextual information for machine learning based test case prioritization in continuous integration development58
A vulnerability detection framework by focusing on critical execution paths50
Editorial Board50
Do users care about ad’s performance costs? Exploring the effects of the performance costs of in-app ads on user experience49
Does shortening the release cycle affect refactoring activities: A case study of the JDT Core, Platform SWT, and UI projects46
Automatically inferring user behavior models in large-scale web applications42
An approach to explore sequential interactions in cognitive activities of software engineering41
Developing Mobile Applications Via Model Driven Development: A Systematic Literature Review39
Featherweight assisted vulnerability discovery39
Guest Editors’ introduction to the special section on the 12th system analysis and modelling conference (SAM 2020)38
Editorial Board37
A Delphi study to recognize and assess systems of systems vulnerabilities37
Ensemble effort estimation for novice agile teams34
Editorial Board34
What do developers consider magic literals? A smalltalk perspective33
Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 2910033
The role of awareness and gamification on technical debt management33
Recruiting credible participants for field studies in software engineering research32
Mind the product owner: An action research project into agile release planning30
Systematic reviews in mobile app software engineering: A tertiary study30
Studying the challenges of developing hardware description language programs30
Challenges and recommendations to publishing and using credible evidence in software engineering29
A light-weight data augmentation method for fault localization29
Spectrum-based multi-fault localization using Chaotic Genetic Algorithm28
Game industry problems: An extensive analysis of the gray literature28
Stakeholder engagement in enterprise architecture practice: What inhibitors are there?28
RSTrace+: Reviewer suggestion using software artifact traceability graphs27
Consistent or not? An investigation of using Pull Request Template in GitHub27
Introduction to special issue on software architectures for smart and adaptive systems (SASAS)27
Making existing software quantum safe: A case study on IBM Db226
Knowledge and research mapping of the data and database forensics domains: A bibliometric analysis26
Editorial Board26
Integrating DSGEO into test case generation for path coverage of MPI programs26
Automated engineering of domain-specific metamorphic testing environments25
Editorial Board25
A modeling assistant to manage technical debt in coupled evolution25
Editorial Board25
CADV: A software visualization approach for code annotations distribution24
Editorial Board24
Variability testing of software product line: A preference-based dimensionality reduction approach23
Detecting false-passing products and mitigating their impact on variability fault localization in software product lines23
Help me with this: A categorization of open source software problems23
Assessing attitudes towards evidence-based software engineering in a government agency23
Laprob: A Label propagation-Based software bug localization method22
Editorial Board22
Social network analysis of open source software: A review and categorisation22
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics22
Leveraging Small Sample Learning for Business Process Management22
A decentralized blockchain oriented framework for automated bug assignment22
Editorial Board21
Method-level bug localization using hybrid multi-objective search21
Editorial Board20
Editorial Board19
Insights on the relationship between decision-making style and personality in software engineering19
Crowdsourced test report prioritization considering bug severity19
Feature-based insight for forks in social coding platforms19
Finding the best learning to rank algorithms for effort-aware defect prediction18
Application of Deep Learning in Software Defect Prediction: Systematic Literature Review and Meta-analysis18
MDSSED: A safety and security enhanced model-driven development approach for smart home apps18
A comprehensive empirical study on bug characteristics of deep learning frameworks18
Case Study Research in Software Engineering—It is a Case, and it is a Study, but is it a Case Study?18
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks18
Reflections on Surrogate-Assisted Search-Based Testing: A Taxonomy and Two Replication Studies based on Industrial ADAS and Simulink Models18
A systematic process for Mining Software Repositories: Results from a systematic literature review18
An exploratory study on just-in-time multi-programming-language bug prediction18
Early prediction for merged vs abandoned code changes in modern code reviews17
Classifying issue reports according to feature descriptions in a user manual based on a deep learning model17
Burnout in software engineering: A systematic mapping study17
Experiences from conducting rapid reviews in collaboration with practitioners — Two industrial cases17
Antecedents of psychological safety in agile software development teams16
Detecting code smells using industry-relevant data16
Understanding in-app advertising issues based on large scale app review analysis16
Tailoring the Scrum framework for software development: Literature mapping and feature-based support16
ST-TLF: Cross-version defect prediction framework based transfer learning16
Improving requirements specification use by transferring attention with eye tracking data16
Summarizing source code with hierarchical code representation15
Theories in Agile Software Development: Past, Present, and Future Introduction to the XP 2020 Special Section15
Deep learning-based software bug classification15
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information15
Bringing architecture-based adaption to the mainstream15
Predictive maintenance using digital twins: A systematic literature review15
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?15
The journey to technical excellence in agile software development15
Task assignment to counter the effect of developer turnover in software maintenance: A knowledge diffusion model15
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree15
Technical debt payment and prevention through the lenses of software architects15
From monolithic systems to Microservices: An assessment framework15
Multi-objective integer programming approaches to Next Release Problem — Enhancing exact methods for finding whole pareto front14
DeepBackground: Metamorphic testing for Deep-Learning-driven image recognition systems accompanied by Background-Relevance14
Evaluating and comparing memory error vulnerability detectors14
Editorial Board14
A risk prediction model for software project management based on similarity analysis of context histories14
Investigation on the stability of SMOTE-based oversampling techniques in software defect prediction13
Human values in software development artefacts: A case study on issue discussions in three Android applications13
Use of personas in Requirements Engineering: A systematic mapping study13
It’s about time: How to study intertemporal choice in systems design13
Improving DevOps team performance through context-capability coalignment: Towards a profile for public sector organizations13
Editorial Board13
Digital-twin-based testing for cyber–physical systems: A systematic literature review13
An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis13
Automating modern code review processes with code similarity measurement13
E-code: Mastering efficient code generation through pretrained models and expert encoder group13
When should we (not) use the mean magnitude of relative error (MMRE) as an error measure in software development effort estimation?13
Towards privacy compliance: A design science study in a small organization13
How ReadMe files are structured in open source Java projects13
Boosting fault localization of statements by combining topic modeling and Ochiai13
Testing infrastructures to support mobile application testing: A systematic mapping study12
A model-driven approach to reengineering processes in cloud computing12
Enhancing software modularization via semantic outliers filtration and label propagation12
BugRadar: Bug localization by knowledge graph link prediction12
Deciphering refactoring branch dynamics in modern code review: An empirical study on Qt12
Spectral clustering based mutant reduction for mutation testing12
Warnings: Violation symptoms indicating architecture erosion12
Strategic digital product management: Nine approaches12
From a Scrum Reference Ontology to the Integration of Applications for Data-Driven Software Development12
Case study identification: A trivial indicator outperforms human classifiers12
The need for more informative defect prediction: A systematic literature review11
Stratified random sampling for neural network test input selection11
Guiding the way: A systematic literature review on mentoring practices in open source software projects11
Improved measurement of software development effort estimation bias11
Approaches to manage the user experience process in Agile software development: A systematic literature review11
Threats to validity in software engineering research: A critical reflection11
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains11
Editorial Board11
Ambiguity in user stories: A systematic literature review11
Revisiting heterogeneous defect prediction methods: How far are we?11
Prevalence and severity of design anti-patterns in open source programs—A large-scale study11
Hidden code vulnerability detection: A study of the Graph-BiLSTM algorithm11
Making vulnerability prediction more practical: Prediction, categorization, and localization11
Software Engineering for Systems-of-Systems and Software Ecosystems11
Enhanced abbreviation–expansion pair detection for glossary term extraction11
Service Design Handover to user experience design – a systematic literature review11
BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection10
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review10
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review10
Knowledge diffusion trajectories of agile software development research: A main path analysis10
Towards a unified criteria model for usability evaluation in the context of open source software based on a fuzzy Delphi method10
Vulnerability detection based on federated learning10
Understanding Hypotheses Engineering in Software Startups through a Gray Literature Review10
An automated test data generation method for void pointers and function pointers in C/C++ libraries and embedded projects10
An empirical comparison of combinatorial testing and search-based testing in the context of automated and autonomous driving systems10
A taxonomy for mining and classifying privacy requirements in issue reports10
Architecting for sustainability of and in the cloud: A systematic literature review10
The impact of the distance metric and measure on SMOTE-based techniques in software defect prediction10
A systematic literature review of capstone courses in software engineering10
Fast and curious: A model for building efficient monitoring- and decision-making frameworks based on quantitative data10
A checklist for the evaluation of software process line approaches9
Maintainability enhancement based on uncertain model transformations9
Leveraging execution traces to enhance traceability links recovery in BPMN models9
Microservice extraction based on knowledge graph from monolithic applications9
Relationships between software architecture and source code in practice: An exploratory survey and interview9
Empirically developed framework for building trust in distributed agile teams9
The impact of human aspects on the interactions between software developers and end-users in software engineering: A systematic literature review9
Requirements engineering for artificial intelligence systems: A systematic mapping study9
Towards building a pragmatic cross-project defect prediction model combining non-effort based and effort-based performance measures for a balanced evaluation9
Preventing technical debt with the TAP framework for Technical Debt Aware Management9
A DQN-based agent for automatic software refactoring9
An empirical study of IoT security aspects at sentence-level in developer textual discussions9
Are your apps accessible? A GCN-based accessibility checker for low vision users9
An end-to-end deep learning system for requirements classification using recurrent neural networks9
Relative estimates of software development effort: Are they more accurate or less time-consuming to produce than absolute estimates, and to what extent are they person-independent?9
A fault localization approach based on fault propagation context9
Analysing the synergies between Multi-agent Systems and Digital Twins: A systematic literature review9
Predicting reliability of software in industrial systems using a Petri net based approach: A case study on a safety system used in nuclear power plant9
Can test input selection methods for deep neural network guarantee test diversity? A large-scale empirical study9
On the effectiveness of testing sentiment analysis systems with metamorphic testing9
Security in agile software development: A practitioner survey9
On meetings involving remote software teams: A systematic literature review9
UX work in software startups: A thematic analysis of the literature9
Context2Vector: Accelerating security event triage via context representation learning9
Towards antifragility of cloud systems: An adaptive chaos driven framework9
The yea-paradox: Cognitive bias in technology acceptance surveys8
Exploring granular test coverage and its evolution with matrix visualizations8
Editorial Board8
Information and software technology: Special section on techdebt 20218
Technical debt management automation: State of the art and future perspectives8
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications8
AGL: Incorporating behavioral aspects into domain-driven design8
A tertiary study on links between source code metrics and external quality attributes8
Characteristics and generative mechanisms of software development productivity distributions8
An empirical study on bugs in JavaScript engines8
Editorial Board8
Investigating the relationship between personalities and agile team climate: A replicated study8
WINE: Warning miner for improving bug finders8
Special section on IST for ICSOB20218
Validating class integration test order generation systems with Metamorphic Testing8
Editorial Board8
Why and how bug blocking relations are breakable: An empirical study on breakable blocking bugs8
A hybrid model for efficient decision-making in self-adaptive systems8
Introduction to Special Issue on Visualization Applied to Software Engineering8
Retrieving arXiv, SocArXiv, and SSRN metadata for initial review screening8
Git command recommendations using crowd-sourced knowledge8
FrMi: Fault-revealing Mutant Identification using killability severity8
Editorial Board8
0.16058111190796