IET Software

Papers
(The median citation count of IET Software is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Retracted: Software solution for text summarisation using machine learning based Bidirectional Encoder Representations from Transformers algorithm27
Selecting reliable blockchain peers via hybrid blockchain reliability prediction26
Structuring meaningful bug‐fixing patches to fix software defect24
Retracted: Smart optimal path with blockchain modelling in internet of things using enhanced K‐means clustering and advance encryption standard21
Effect of requirements specification using native language on external software quality21
Constructing meaningful code changes via graph transformer18
A systematic mapping study on machine learning methodologies for requirements management18
Retracted: Blockchain‐based covert software information transmission for bitcoin17
The impact of feature selection techniques on effort‐aware defect prediction: An empirical study17
SmartProvenance: User‐friendly provenance system for internet of things applications based on event flow graphs17
Data visualisation in continuous integration and delivery: Information needs, challenges, and recommendations16
IAPCP: An Effective Cross‐Project Defect Prediction Model via Intra‐Domain Alignment and Programming‐Based Distribution Adaptation15
Malware recognition approach based on self‐similarity and an improved clustering algorithm14
A deep learning‐based approach for software vulnerability detection using code metrics14
Software defect prediction based on stacked sparse denoising autoencoders and enhanced extreme learning machine9
9
A Data‐Driven Artificial Neural Network Approach to Software Project Risk Assessment9
8
Retracted: Intelligent design of rural residential environment guided by blockchain under the concept of green low carbon8
Retracted: Optimization of E‐commerce platform marketing method and comment recognition model based on deep learning and intelligent blockchain8
Towards a privacy debt7
7
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization7
An Expository Examination of Temporally Evolving Graph‐Based Approaches for the Visual Investigation of Autonomous Driving7
An improved K‐means algorithm for big data6
Using system dynamics to teach about dependencies, correlation and systemic thinking on the software process workflows6
A Meta‐Model Architecture and Elimination Method for Uncertainty Modeling6
Proposed ethical framework for software requirements engineering6
Design and Efficacy of a Data Lake Architecture for Multimodal Emotion Feature Extraction in Social Media6
Assessment of process capabilities in transition to a data‐driven organisation: A multidisciplinary approach5
Emerging and multidisciplinary approaches to software engineering5
An Empirical Study on Downstream Dependency Package Groups in Software Packaging Ecosystems5
Vulcont: A recommender system based on context history ontology4
4
Bayesian Network analysis of software logs for data‐driven software maintenance4
Evaluating the Impact of Data Transformation Techniques on the Performance and Interpretability of Software Defect Prediction Models4
4
Test‐driven development, engagement in activity, and maintainability: An empirical study4
Measuring teamwork quality in large‐scale agile organisations evaluation and integration of the aTWQ approach4
VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis4
Exploiting DBSCAN and Combination Strategy to Prioritize the Test Suite in Regression Testing4
3
Unveiling the Dynamics of Extrinsic Motivations in Shaping Future Experts’ Contributions to Developer Q&A Communities3
A 20‐year mapping of Bayesian belief networks in software project management3
A decision framework for cloud migration: A hybrid approach3
3
Applying usability recommendations when developing mobile instant messaging applications3
Conformance evaluation of the top‐100 Ethereum token smart contracts with Ethereum Request for Comment‐20 functional specifications3
A systematic mapping study of source code representation for deep learning in software engineering3
A memetic algorithm for high‐strength covering array generation3
An unsupervised cross project model for crashing fault residence identification3
Segmented Frequency‐Domain Correlation Prediction Model for Long‐Term Time Series Forecasting Using Transformer3
Applying virtual reality to teach the software development process to novice software engineers2
Software Defect Prediction Using Deep Q‐Learning Network‐Based Feature Extraction2
DOOSRA—Distributed Object‐Oriented Software Restructuring Approach using DIM‐K‐means and MAD‐based ENRNN classifier2
A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD)2
Characterising the digital transformation of IT consulting services–Results from a systematic mapping study2
Automated Hybrid Methodology for Software Architecture Style Selection Using Analytic Hierarchy Process and Fuzzy Analytic Hierarchy Process2
Design of a gamification strategy to intervene in social and human factors associated with software process improvement change resistance2
Realising benefits in public IT projects: A multiple case study2
A new localization method based on improved particle swarm optimization for wireless sensor networks2
Measuring nesting2
2
Android malware detection via efficient application programming interface call sequences extraction and machine learning classifiers2
Cross‐Project Defect Prediction Using Transfer Learning with Long Short‐Term Memory Networks2
Managing non‐functional requirements in agile software development2
ConCPDP: A Cross‐Project Defect Prediction Method Integrating Contrastive Pretraining and Category Boundary Adjustment2
Mutation‐inspired symbolic execution for software testing2
Beyond factors that motivate the adoption of the ISO/IEC 29110 in Mexico: An exploratory study of the implementation pace of this standard and the benefits observed2
Mining relevant solutions for programming tasks from search engine results1
IC‐GraF: An Improved Clustering with Graph‐Embedding‐Based Features for Software Defect Prediction1
Retracted: A software‐based framework for the development of smart healthcare systems using fog computing1
Retracted: Research on intelligent elevation control method of shearer drum based on deep learning1
Retracted: Software based sentiment analysis of clinical data for healthcare sector1
Understanding Work Rhythms in Software Development and Their Effects on Technical Performance1
Embedding and classifying test execution traces using neural networks1
Retracted: A conceptual framework for crowdsourcing requirements engineering in SCRUM‐based environment1
Benefits management and Information Technology work distribution1
Retracted: Anomaly detection with ensemble empirical mode decomposition and approximate entropy for quick user datagram protocol internet connection‐based distributed Blockchain systems1
Software engineering and 12 prominent sub‐areas: Comprehensive bibliometric assessment on 13 years (2007–2019)1
A synergic quantum particle swarm optimisation for constrained combinatorial test generation1
Blockchain Consensus Scheme Based on the Proof of Distributed Deep Learning Work1
Concurrent software fine‐coarse‐grained automatic modelling by Coloured Petri Nets for model checking1
A cross‐project defect prediction method based on multi‐adaptation and nuclear norm1
1
An Observational Study on React Native (RN) Questions on Stack Overflow (SO)1
Guest Editorial: Machine learning applied to quality and security in software systems1
A hybrid model for prediction of software effort based on team size1
A new index‐based hyper‐heuristic algorithm for global optimisation problems1
Metamorphic testing of named entity recognition systems: A case study1
1
Research and Application of Firewall Log and Intrusion Detection Log Data Visualization System1
MetaFL: Metamorphic fault localisation using weakly supervised deep learning1
Retracted: Track and field competition data collection using a vision sensor system and machine learning1
Revisit security in the era of DevOps: An evidence‐based inquiry into DevSecOps industry1
Mining detailed information from the description for App functions comparison1
Retracted: The use of the intelligent Bayesian network method combined with blockchain technology in the optimisation of tunnel construction quality control1
0.10276889801025