Information and Software Technology

Papers
(The TQCC of Information and Software Technology is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Early prediction for merged vs abandoned code changes in modern code reviews214
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation192
A Delphi study to recognize and assess systems of systems vulnerabilities182
Feature-based insight for forks in social coding platforms159
Recruiting credible participants for field studies in software engineering research104
Automatically inferring user behavior models in large-scale web applications92
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks87
A vulnerability detection framework by focusing on critical execution paths85
Insights on the relationship between decision-making style and personality in software engineering83
CADV: A software visualization approach for code annotations distribution81
Burnout in software engineering: A systematic mapping study79
Stakeholder engagement in enterprise architecture practice: What inhibitors are there?74
What do developers consider magic literals? A smalltalk perspective70
Game industry problems: An extensive analysis of the gray literature66
Finding the best learning to rank algorithms for effort-aware defect prediction54
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks53
Warnings: Violation symptoms indicating architecture erosion52
Leveraging execution traces to enhance traceability links recovery in BPMN models49
Context2Vector: Accelerating security event triage via context representation learning45
On the generalizability of Neural Program Models with respect to semantic-preserving program transformations44
Threats to validity in software engineering research: A critical reflection43
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains42
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications40
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation40
From a Scrum Reference Ontology to the Integration of Applications for Data-Driven Software Development40
An end-to-end deep learning system for requirements classification using recurrent neural networks39
An exploratory study of bug prediction at the method level39
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning39
A model-driven approach to reengineering processes in cloud computing38
Ambiguity in user stories: A systematic literature review37
Improved measurement of software development effort estimation bias36
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems36
A hybrid model for efficient decision-making in self-adaptive systems35
Editorial Board35
A multi-objective agile project planning model and a comparative meta-heuristic approach34
Processes, challenges and recommendations of Gray Literature Review: An experience report34
Graph-based code semantics learning for efficient semantic code clone detection34
To group or not to group? Group sizes for requirements elicitation34
Towards automating self-admitted technical debt repayment32
Augmenting commit classification by using fine-grained source code changes and a pre-trained deep neural language model31
Editorial Board30
Comparison of multi-criteria decision-making methods for online controlled experiments in a launch decision-making framework30
Editorial Board29
Editorial Board29
Editorial Board29
Prioritisation of code clones using a genetic algorithm29
An empirical study of emoji use in software development communication28
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing28
Test Code Flakiness in Mobile Apps: The Developer’s Perspective28
Detecting privacy requirements from User Stories with NLP transfer learning models28
An alternative to code comment generation? Generating comment from bytecode27
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement27
Dev2vec: Representing domain expertise of developers in an embedding space27
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm26
Short communication: Evolution of secondary studies in software engineering26
Community smells—The sources of social debt: A systematic literature review26
A brief note, with thanks, on the contributions of Guenther Ruhe25
Investigating replication challenges through multiple replications of an experiment24
Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations24
Generating feasible protocol test sequences from EFSM models using Monte Carlo tree search24
Developers’ viewpoints to avoid bug-introducing changes24
Towards a taxonomy of code review smells23
An exploratory study of software artifacts on GitHub from the lens of documentation23
Causal reasoning in Software Quality Assurance: A systematic review23
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?23
Automatically repairing tensor shape faults in deep learning programs23
Coverage-enhanced fault diagnosis for Deep Learning programs: A learning-based approach with hybrid metrics23
UX Research practices related to Long-Term UX: A Systematic Literature Review22
Personalizing label prediction for GitHub issues22
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation22
Graph-based explainable vulnerability prediction22
Improving effort-aware defect prediction by directly learning to rank software modules22
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security22
Overlapping community detection in software ecosystem based on pheromone guided personalized PageRank algorithm21
Microservice-based projects in agile world: A structured interview21
FCTree: Visualization of function calls in execution21
A mixed method study of DevOps challenges21
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines20
Introduction to the special issue on managing software processes using soft computing techniques20
An expressive and modular layer activation mechanism for Context-Oriented Programming20
Analyzing the sensitivity of multi-objective software architecture refactoring to configuration characteristics20
Cross-Modal Retrieval-enhanced code Summarization based on joint learning for retrieval and generation20
Impact of software development processes on the outcomes of student computing projects: A tale of two universities20
Introduction to the Special Issue on: Grey Literature and Multivocal Literature Reviews (MLRs) in software engineering20
Genetic model-based success probability prediction of quantum software development projects19
The impact of knowledge inertia on process tailoring in the dynamic development of software projects in Chinese industries19
FRL-MFPG: Propagation-aware fault root cause location for microservice intelligent operation and maintenance19
Skills development for software engineers: Systematic literature review19
MT-Nod: Metamorphic testing for detecting non-optimal decisions of autonomous driving systems in interactive scenarios19
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing19
Editorial Board18
Editorial Board18
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants18
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method17
Dynamic robustness evaluation for automated model selection in operation17
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies17
A survey on Cryptoagility and Agile Practices in the light of quantum resistance17
An information theoretic notion of software testability17
A methodology to automatically translate user requirements into visualizations: Experimental validation17
Editorial Board16
Automating user-feedback driven requirements prioritization16
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success16
Exploring the means to measure explainability: Metrics, heuristics and questionnaires16
SE3M: A model f16
Application of knowledge graph in software engineering field: A systematic literature review16
A random forest model for early-stage software effort estimation for the SEERA dataset16
Challenges and recommendations to publishing and using credible evidence in software engineering16
Convergence rate of Artificial Neural Networks for estimation in software development projects16
Antecedents of psychological safety in agile software development teams16
Editorial Board15
On the use of contextual information for machine learning based test case prioritization in continuous integration development15
When should we (not) use the mean magnitude of relative error (MMRE) as an error measure in software development effort estimation?15
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information15
Studying the challenges of developing hardware description language programs15
Preventing technical debt with the TAP framework for Technical Debt Aware Management15
The journey to technical excellence in agile software development15
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics15
Editorial Board15
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?15
Integrating DSGEO into test case generation for path coverage of MPI programs15
Information and software technology: Special section on techdebt 202114
Service Design Handover to user experience design – a systematic literature review14
Reinforcement learning for test case prioritization based on LLEed K-means clustering and dynamic priority factor14
Context-based statement-level vulnerability localization14
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network14
A software product line approach for developing hybrid software systems14
Towards antifragility of cloud systems: An adaptive chaos driven framework14
A field experiment on trialsourcing and the effect of contract types on outsourced software development14
Making vulnerability prediction more practical: Prediction, categorization, and localization14
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities14
Are your apps accessible? A GCN-based accessibility checker for low vision users13
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network13
The need for more informative defect prediction: A systematic literature review13
Does it matter who pays back Technical Debt? An empirical study of self-fixed TD13
Case study identification: A trivial indicator outperforms human classifiers13
A systematic literature review of capstone courses in software engineering13
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review13
How far are we from reproducible research on code smell detection? A systematic literature review12
BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection12
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling12
Exploring the communication functions of comments during bug fixing in Open Source Software projects12
Like, dislike, or just do it? How developers approach software development tasks12
The yea-paradox: Cognitive bias in technology acceptance surveys12
Automation of systematic literature reviews: A systematic literature review12
Test case recommendation based on balanced distance of test targets12
Assessing and improving syntactic adversarial robustness of pre-trained models for code translation12
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review12
Memorization and generalization in neural code intelligence models12
Speeding up constraint-based program repair using a search-based technique12
Requirements engineering: Foundation for software quality (REFSQ2020)12
Successful combination of database search and snowballing for identification of primary studies in systematic literature studies11
Double-counting in software engineering tertiary studies — An overlooked threat to validity11
A search-based framework for automatic generation of testing environments for cyber–physical systems11
SHSE: A subspace hybrid sampling ensemble method for software defect number prediction11
Fine-tuning and prompt engineering for large language models-based code review automation11
Negative effects of gamification in education software: Systematic mapping and practitioner perceptions11
Transparency and explainability of AI systems: From ethical guidelines to requirements11
Introduction to the special issue on dependable systems and applications11
Case study identification with GPT-4 and implications for mapping studies11
An empirical study on ML DevOps adoption trends, efforts, and benefits analysis11
A systematic mapping study of bug reproduction and localization11
“Won’t We Fix this Issue?” Qualitative characterization and automated identification of wontfix issues on GitHub11
Code smell detection using feature selection and stacking ensemble: An empirical investigation11
How do software practitioners perceive human-centric defects?11
Predicting the precise number of software defects: Are we there yet?11
Introduction to the Special Section on the Best Papers from REFSQ 202211
Mobile app privacy in software engineering research: A systematic mapping study11
Multi-objective software performance optimisation at the architecture level using randomised search rules11
Studying logging practice in machine learning-based applications11
Progress on class integration test order generation approaches: A systematic literature review10
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code10
RoseMatcher: Identifying the impact of user reviews on app updates10
An empirical study on self-admitted technical debt in modern code review10
Understanding how early-stage researchers leverage socio-technical affordances for distributed research support10
Dealing with imbalanced data for interpretable defect prediction10
Inferring data model from service interactions for response generation in service virtualization10
Native cross-platform app development using the SequalsK transpiler10
Probabilistic program performance analysis with confidence intervals10
Machine translation-based fine-grained comments generation for solidity smart contracts10
Information needs and presentation in agile software development10
Visualizations for the evolution of Variant-Rich Systems: A systematic mapping study10
CLeBPI: Contrastive Learning for Bug Priority Inference10
Enabling efficient and low-effort decentralized federated learning with the EdgeFL framework10
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding10
Editorial Board9
The discovery effort worthiness index: How much product discovery should you do and how can this be integrated into delivery?9
The impact of using biased performance metrics on software defect prediction research9
SENEM: A software engineering-enabled educational metaverse9
Predicting vulnerability inducing function versions using node embeddings and graph neural networks9
Impact of minimum viable product on software ecosystem failure9
Job satisfaction in agile information systems development: A stakeholder perspective9
Why and how do organizations create user-led open source consortia? A systematic literature review9
Issues-Driven features for software fault prediction9
Guidelines for the development of a critical software under emergency9
Motivations, benefits, and issues for adopting Micro-Frontends: A Multivocal Literature Review9
Squeeziness for non-deterministic systems9
A unifying framework for the systematic analysis of Git workflows9
Locality-based security bug report identification via active learning9
Relating team atmosphere and group dynamics to student software development teams’ performance9
An investigation of causes and effects of trust in Boundary Artefacts9
The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering9
Metamorphic testing of OpenStreetMap9
An empirical study on secure usage of mobile health apps: The attack simulation approach9
Code review guidelines for GUI-based testing artifacts9
Reporting case studies in systematic literature studies—An evidential problem9
Improving high-impact bug report prediction with combination of interactive machine learning and active learning9
The lifecycle of Technical Debt that manifests in both source code and issue trackers9
Measuring the cognitive load of software developers: An extended Systematic Mapping Study9
A deep learning-based automated framework for functional User Interface testing9
Aligned metric representation based balanced multiset ensemble learning for heterogeneous defect prediction9
On preserving the behavior in software refactoring: A systematic mapping study9
Many-objective optimization of non-functional attributes based on refactoring of software models9
0.091154098510742