International Journal on Software Tools for Technology Transfer

Papers
(The median citation count of International Journal on Software Tools for Technology Transfer is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
The probabilistic model checker Storm56
A taxonomy for classifying runtime verification tools34
Rigorous engineering of collective adaptive systems: special section27
Static analysis for discovering IoT vulnerabilities27
KLEE symbolic execution engine in 201918
An efficient statistical model checker for nondeterminism and rare events15
The scenario coevolution paradigm: adaptive quality assurance for adaptive systems13
Programming dynamic reconfigurable systems12
Swarm model checking on the GPU12
Neural predictive monitoring and a comparison of frequentist and Bayesian approaches11
OC-PM: analyzing object-centric event logs and process models11
The DReAM framework for dynamic reconfigurable architecture modelling: theory and applications11
CPSDebug: Automatic failure explanation in CPS models10
Stream runtime verification of real-time event streams with the Striver language10
Algebraic aggregation of random forests: towards explainability and rapid evaluation9
AMT 2.0: qualitative and quantitative trace analysis with extended signal temporal logic9
Verification and refutation of C programs based on k-induction and invariant inference9
DisCoveR: accurate and efficient discovery of declarative process models9
VerifyThis 2019: a program verification competition8
Exploring the ERTMS/ETCS full moving block specification: an experience with formal methods8
Graph-based technique for survivability assessment and optimization of IoT applications8
Correct program parallelisations8
ESBMC 6.1: automated test case generation using bounded model checking8
Plain random test generation with PRTest8
The RERS challenge: towards controllable and scalable benchmark synthesis7
SaBRe: load-time selective binary rewriting7
First three years of the international verification of neural networks competition (VNN-COMP)7
Verifiable strategy synthesis for multiple autonomous agents: a scalable approach7
Formal methods and tools for industrial critical systems6
Toward autonomically composable and context-dependent access control specification through ensembles6
DFT modeling approach for operational risk assessment of railway infrastructure6
The Refinement Calculus of Reactive Systems Toolset6
Formal testing of timed graph transformation systems using metric temporal graph logic6
SMT solving for the validation of B and Event-B models5
What can we monitor over unreliable channels?5
Comparing mutation coverage against branch coverage in an industrial setting5
Scenario-based verification of uncertain parametric MDPs5
Software test results exploration and visualization with continuous integration and nightly testing5
Avoiding unnecessary information loss: correct and efficient model synchronization based on triple graph grammars5
Compositional learning of mutually recursive procedural systems5
CoCo 2019: report on the eighth confluence competition5
Model-based optimization of ARINC-653 partition scheduling5
Incremental execution of rule-based model transformation5
Scalable online first-order monitoring4
Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system4
Leveraging polyhedral reductions for solving Petri net reachability problems4
Cooperative verifier-based testing with CoVeriTest4
Modeling and formal analysis of virtually synchronous cyber-physical systems in AADL4
The Log Skeleton Visualizer in ProM 6.94
CPA/Tiger-MGP: test-goal set partitioning for efficient multi-goal test-suite generation4
Efficient and expressive bytecode-level instrumentation for Java programs4
CoVeriTest: interleaving value and predicate analysis for test-case generation4
Symbiotic  6: generating test cases by slicing and symbolic execution4
Decision-making under uncertainty: beyond probabilities4
Towards language-to-language transformation4
VeriVANca framework: verification of VANETs by property-based message passing of actors in Rebeca with inheritance4
Introduction to special section on the ABZ 2018 case study: Hybrid ERTMS/ETCS Level 34
First international competition on software testing4
Analyzing neural network behavior through deep statistical model checking3
A calculus for modular loop acceleration and non-termination proofs3
Dependency graphs with applications to verification3
An extension of first-order LTL with rules with application to runtime verification3
Extending a brainiac prover to lambda-free higher-order logic3
An overview of structural coverage metrics for testing neural networks3
Formal modeling and verification for amplification timing anomalies in the superscalar TriCore architecture3
SyReNN: A tool for analyzing deep neural networks3
A logic-based incremental approach to graph repair featuring delta preservation3
Towards rigorous understanding of neural networks via semantics-preserving transformations3
Forest GUMP: a tool for verification and explanation3
The power of typed affine decision structures: a case study3
Comparing controlled system synthesis and suppression enforcement3
Improving AMulet2 for verifying multiplier circuits using SAT solving and computer algebra3
Verifying safety of synchronous fault-tolerant algorithms by bounded model checking3
Temporal-logic query checking over finite data streams3
Specifying and detecting temporal patterns with shape expressions3
TOOLympics I: Competition on software testing3
FairFuzz-TC: a fuzzer targeting rare branches3
Verification and synthesis of co-simulation algorithms subject to algebraic loops and adaptive steps3
Generating test as a web service (TaaWS) through a method-based attribute grammar2
Into the unknown: active monitoring of neural networks (extended version)2
Study of the efficiency of model checking techniques using results of the MCC from 2015 To 20192
Extended abstract dependency graphs2
Supporting safe metamodel evolution with edelta2
Verifying OpenJDK’s LinkedList using KeY (extended paper)2
ADTLang: a programming language approach to attack defense trees2
SL-COMP: competition of solvers for separation logic2
CESRBDDs: binary decision diagrams with complemented edges and edge-specified reductions2
Algebraically explainable controllers: decision trees and support vector machines join forces2
Diagnosing timed automata using timed markings2
From linear temporal logic and limit-deterministic Büchi automata to deterministic parity automata2
Energy characterization of IoT systems through design aspect monitoring2
A compositional framework for algebraic quantitative online monitoring over continuous-time signals2
Automating deductive verification for weak-memory programs (extended version)2
Analysis of recurrent neural networks via property-directed verification of surrogate models2
Modelling flocks of birds and colonies of ants from the bottom up2
A domain-specific language to design false data injection tests for air traffic control systems2
0.020648956298828