Journal of Systems and Software

Papers
(The TQCC of Journal of Systems and Software is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Editorial Board251
Portfolio Evolution Analysis for SPL Scoping: Unveiling the dynamics with dedicated time-series dashboards183
EFACT: An External Function Auto-Completion Tool to strengthen static binary lifting178
Evolution patterns of software-architecture smells: An empirical study of intra- and inter-version smells140
Managing the changing understanding of benefits in software initiatives121
Feature models to boost the vulnerability management process114
Deep learning framework testing via hierarchical and heuristic model generation96
Investigating end-users’ values in agriculture mobile applications development: An empirical study on Bangladeshi female farmers85
Modeling and safety analysis for collaborative safety-critical systems using hierarchical colored Petri nets80
Editorial Board70
GitHub repositories with links to academic papers: Public access, traceability, and evolution68
Understanding participation and corporatization in service of diversity in free/libre and open source software development projects65
Translating meaning representations to behavioural interface specifications65
Different approaches for testing body sensor network applications65
Data preparation for Deep Learning based Code Smell Detection: A systematic literature review65
Uncovering gender gap in academia: A comprehensive analysis within the software engineering community64
VULOC: Vulnerability location framework based on assembly code slicing63
On measuring coupling between microservices62
The uphill journey of FaaS in the open-source community62
ECCOLA — A method for implementing ethically aligned AI systems62
Usability inspection: Novice crowd inspectors versus expert61
On misbehaviour and fault tolerance in machine learning systems59
A MILP model on coordinated coverage path planning system for UAV-ship hybrid team scheduling software56
Mining user reviews of COVID contact-tracing apps: An exploratory analysis of nine European apps56
Dear Researchers: Think about the future, for sure, but please don't forget about the present – the Odense Manifesto for academia–industry collaboration at ICSA 202552
Fault-tolerant scheduling and data placement for scientific workflow processing in geo-distributed clouds52
The effect of advice network connectedness on problem-solving competence among software developers48
A systematic literature review on Android-specific smells48
A survey on machine learning techniques applied to source code47
Prevalence, common causes and effects of technical debt: Results from a family of surveys with the IT industry45
Discovering boundary values of feature-based machine learning classifiers through exploratory datamorphic testing44
VIBE: Looking for Variability In amBiguous rEquirements42
A comprehensive empirical investigation on failure clustering in parallel debugging42
Diverse title generation for Stack Overflow posts with multiple-sampling-enhanced transformer42
A model-driven approach for continuous performance engineering in microservice-based systems42
A modular metamodel and refactoring rules to achieve software product line interoperability40
Explaining software fault predictions to spreadsheet users38
Challenges and opportunities: Implementing diversity and inclusion in software engineering university level education in Finland37
Advancing modern code review effectiveness through human error mechanisms37
Flexible control flow graph alignment for delivering data-driven feedback to novice programming learners37
Leveraging belief uncertainty for informed decision making in software product line evolution36
Maximizing integrative learning in software development teams: A systematic review of key drivers and future research agenda35
A data-driven active learning approach to reusing ML solutions in scientific applications35
VeriFix: Verifying your fix towards an atomicity violation35
Reproducibility of issues reported in stack overflow questions: Challenges, impact & estimation35
Improve cross-project just-in-time defect prediction with dynamic transfer learning35
Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification34
Examining the impact of bias mitigation algorithms on the sustainability of ML-enabled systems: A benchmark study34
Software micro-rejuvenation for Android mobile systems34
When traceability goes awry: An industrial experience report33
Combine sliced joint graph with graph neural networks for smart contract vulnerability detection32
Taxonomy of security weaknesses in Java and Kotlin Android apps32
Multi-granularity coverage criteria for deep reinforcement learning systems32
A fuzzy logic-based quality model for identifying microservices with low maintainability31
Conformance assessment of Architectural Design Decisions on API endpoint designs derived from domain models31
Automatically recognizing the semantic elements from UML class diagram images31
An evidence-based roadmap for IoT software systems engineering31
DLAP: A Deep Learning Augmented Large Language Model Prompting framework for software vulnerability detection30
SynthoMinds: Bridging human programming intuition with retrieval, analogy, and reasoning in program synthesis30
BEACon-TD: Classifying Technical Debt and its types across diverse software projects issues using transformers30
Editorial of the special issue on Quality in Software Architecture30
Code search engines for the next generation30
Optimizing smart contract vulnerability detection via multi-modality code and entropy embedding30
A speech-enabled virtual assistant for efficient human–robot interaction in industrial environments30
Examining the effect of software professionals’ personality & additional capabilities on agile teams’ climate29
Automatic modelling and verification of Autosar architectures29
Variability management and software product line knowledge in software companies29
DValidator: An approach for validating dependencies in build configurations29
Continuous software security through security prioritisation meetings28
A proposal and assessment of an improved heuristic for the Eager Test smell detection28
OREO: A tool-supported approach for offline run-time monitoring and fault–error–failure chain localization28
Data catalog tools: A systematic multivocal literature review27
End-users’ knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers27
Survey of annotation generators for deductive verifiers27
Correctness and security analysis of the protection in transit (PIT) protocol27
Effectiveness of symmetric metamorphic relations on validating the stability of code generation LLM27
Design for dependability — State of the art and trends27
Transformation-based model checking temporal trust in multi-agent systems26
A critical comparison on six static analysis tools: Detection, agreement, and precision26
Understanding the low inter-rater agreement on aggressiveness on the Linux Kernel Mailing List26
Fault analysis in additive manufacturing: Identifying causes of three-dimensional printer faults using machine learning and large language models25
Choosing the right path for AI integration in engineering companies: A strategic guide25
Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction25
Work-from-home is here to stay: Call for flexibility in post-pandemic work policies25
A sampling-based online Co-Location-Resistant Virtual Machine placement strategy25
Navigating the DevOps landscape25
An empirical study on the performance overhead of code instrumentation in containerised microservices24
Exploring multi-programming-language commits and their impacts on software quality: An empirical study on Apache projects24
Architecting ML-enabled systems: Challenges, best practices, and design decisions24
CharM — Evaluating a model for characterizing service-based architectures24
Pragmatic random sampling of Kconfig-based systems: A unified approach24
Editorial Board23
SEXTAMT: A systematic map to navigate the wide seas of factors affecting expert judgment software estimates23
BinCoFer: Three-stage purification for effective C/C++ binary third-party library detection23
BlockSOP: A blockchain-based software management platform for open collaborative development23
Integration test order generation based on reinforcement learning considering class importance22
A structural taxonomy for lifted software product line analyses22
Software product lines and features from the perspective of set theory with an application to feature location22
A bot identification model and tool based on GitHub activity sequences22
Editorial Board22
Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach22
Semantic interoperability for an AI-based applications platform for smart hospitals using HL7 FHIR21
Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode21
Deriving modernity signatures of codebases with static analysis21
Boosting source code suggestion with self-supervised Transformer Gated Highway21
Architectural tactics to achieve quality attributes of machine-learning-enabled systems: a systematic literature review21
Considerations and challenges for the adoption of open source components in software-intensive businesses21
Retriever: A view-based approach to reverse engineering software architecture models20
Do code reviews lead to fewer code smells?20
The pipeline for the continuous development of artificial intelligence models—Current state of research and practice20
MPLinker: Multi-template Prompt-tuning with adversarial training for Issue–commit Link recovery20
Empirical pathways to developer experience: A facet-based synthesis of empirical designs and guidelines20
Extracting goal models from natural language requirement specifications20
Developers’ need for the rationale of code commits: An in-breadth and in-depth study19
An empirical investigation into the capabilities of anomaly detection approaches for test smell detection19
Runtime reliability fractional distribution change analytics against cloud-based systems DDoS attacks19
Machine learning approaches for automated software traceability: A systematic literature review19
UVL: Feature modelling with the Universal Variability Language19
On the impact of single and co-occurrent refactorings on quality attributes in android applications19
Multivocal study on microservice dependencies19
L19
Incentive mechanism for mobile crowd sensing with Assumed Bid Cost Reverse Auction19
Incremental-concurrent fusion checking for efficient context consistency19
Automatic prediction of developers’ resolutions for software merge conflicts19
On the evolution of agile software team work arrangements19
Supporting meta-model-based language evolution and rapid prototyping with automated grammar transformation19
Just-in-time software vulnerability detection: Are we there yet?19
A cloud-based data processing and visualization pipeline for the fibre roll-out in Germany18
On the relationship between source-code metrics and cognitive load: A systematic tertiary review18
Code beauty is in the eye of the beholder: Exploring the relation between code beauty and quality18
UX-work related needs in software startups: Diagnosis and resolution18
Decentralized decision-making and scaled autonomy at Spotify18
GDFuzz: An efficient directed fuzzing method based on XAI18
ExTrA: Explaining architectural design tradeoff spaces via dimensionality reduction18
A/B testing: A systematic literature review18
An empirical evaluation of static, dynamic, and hybrid slicing of WebAssembly binaries17
A Cross-Domain Systematic Mapping Study on Software Engineering for Digital Twins17
The AmbiTRUS framework for identifying potential ambiguity in user stories17
Developing and sustaining a student-driven software solutions center—An experience report17
Hierarchical tree-based algorithms for efficient expression parsing and test sequence generation in software models17
Collection skeletons: Declarative abstractions for data collections17
Editorial Board17
CubeAgent: Efficient query-based video adversarial examples generation through deep reinforcement learning16
Performability evaluation of NoSQL-based storage systems16
Software engineering education: Results from a training intervention based on SonarCloud when developing web apps16
How can feature usage be tracked across product variants? Implicit Feedback in Software Product Lines16
Automated functional and robustness testing of microservice architectures16
Beyond code: Is there a difference between comments in visual and textual languages?16
Test scenario generation for feature-based context-oriented software systems16
EnseSmells : Deep ensemble and programming language models for automated code smells detection16
Machine Learning for Software Aging Detection: A Systematic Mapping Study16
People want reassurance when making privacy-related decisions — Not technicalities16
An architecture for model-based and intelligent automation in DevOps16
Input sensitivity on the performance of configurable systems an empirical study16
Adaptive robustness evaluation for complex system prognostics and health management software platform16
Modeling and verifying resources and capabilities of ubiquitous scenarios for Unmanned Aerial Vehicle swarm16
Refactoring react-based Web apps16
DigBug—Pre/post-processing operator selection for accurate bug localization16
A systematic literature review on benchmarks for evaluating debugging approaches16
An empirical evaluation of quasi-static executable slices15
Mapping the structure and evolution of software testing research over the past three decades15
Software engineering team project courses with industrial customers: Students’ insights on challenges and lessons learned15
Barriers to device longevity and reuse: A vintage device empirical study15
Benchmarking scalability of stream processing frameworks deployed as microservices in the cloud15
CONSERVE: A framework for the selection of techniques for monitoring containers security15
SuMo: A mutation testing approach and tool for the Ethereum blockchain15
SCGRU: A general approach for identifying multiple classes of self-admitted technical debt with text generation oversampling15
Profiling gas consumption in solidity smart contracts15
Understanding practitioners’ challenges and requirements in the design, implementation, and evaluation of anti-phishing interventions15
Organizational factors of software performance testing for systems of systems: A case study using high-reliability organization theory to understand an outage15
Missing standard features compared with similar apps? A feature recommendation method based on the knowledge from user interface14
On the dependency heaviness of CRAN/Bioconductor ecosystem14
An efficient heuristic algorithm for software module clustering optimization14
FSECAM: A contextual thematic approach for linking feature to multi-level software architectural components14
A comparative analysis of ML techniques for bug report classification14
Refactoring cross-project code duplication in an industrial software product line: A case study from RDW14
The qualitative factor in software testing: A systematic mapping study of qualitative methods14
EdgeWorkflow: One click to test and deploy your workflow applications to the edge14
Research artifacts in software engineering publications: Status and trends14
Impermanent identifiers: Enhanced source code comprehension and refactoring14
Model-driven safety and security co-analysis: A systematic literature review14
Editorial Board14
Mutation testing of PL/SQL programs14
CSAT: Configuration structure-aware tuning for highly configurable software systems14
Editorial Board14
Assets in Software Engineering: What are they after all?14
So much more than test cases – An industrial study on testing of software units and components14
CoDEvo: Column family database evolution using model transformations14
CIT-daily: A combinatorial interaction testing-based daily build process14
On the relation of method popularity to breaking changes in the Maven ecosystem13
Product lines of dataflows13
A model-based mode-switching framework based on security vulnerability scores13
SGT: Aging-related bug prediction via semantic feature learning based on graph-transformer13
Automatically generating test cases for safety-critical software via symbolic execution13
Improving test case selection by handling class and attribute noise13
Assessing UML Diagrams by GPT: Implications for Education13
Shedding light on the dark side – A systematic literature review of the issues in agile software development methodology use13
Secure and flexible message-based communication for mobile apps within and across devices13
Investigating acceptance behavior in software engineering—Theoretical perspectives13
An analysis of open source software licensing questions in Stack Exchange sites13
Software modernization powered by dynamic language product lines13
Predicting test failures induced by software defects: A lightweight alternative to software defect prediction and its industrial application13
An annotation-based approach for finding bugs in neural network programs13
Agile elicitation of scalability requirements for open systems: A case study13
Enhancing vulnerability repair through the extraction and matching of repair patterns13
Test case prioritization using partial attention13
Perceptions of the human and social factors that influence the productivity of software development teams in Colombia: A statistical analysis12
A model-driven formal methods approach to software architectural security vulnerabilities specification and verification12
AI-Driven Decision-Making in Healthcare Information Systems: A Comprehensive Review12
Mokav: Execution-driven differential testing with LLMs12
An empirical study of COVID-19 related posts on Stack Overflow: Topics and technologies12
Identifying concerns when specifying machine learning-enabled systems: A perspective-based approach12
An Investigation of confusing code patterns in JavaScript12
TitleGen-FL: Quality prediction-based filter for automated issue title generation12
On the outdatedness of workflows in the GitHub Actions ecosystem12
Adaptive data quality scoring operations framework using drift-aware mechanism for industrial applications12
Feature-based software design pattern detection12
Empathy models and software engineering — A preliminary analysis and taxonomy12
Exploring developer experience factors in software ecosystems12
Software engineering for quantum programming: How far are we?12
An empirical study of software architecture resilience evaluation methods11
Demystifying issues, causes and solutions in LLM open-source projects11
GeQuPI: Quantum Program Improvement with Multi-Objective Genetic Programming11
DongTing: A large-scale dataset for anomaly detection of the Linux kernel11
Towards cost-efficient vulnerability detection with cross-modal adversarial reprogramming11
DeepKernel: 2D-kernels clustering based mutant reduction for cost-effective deep learning model testing11
A systematic review on security and safety of self-adaptive systems11
Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java11
Out of the BLEU: How should we assess quality of the Code Generation models?11
It all starts with structure: investigating learning dynamics in large-scale agile software development11
Log statements generation via deep learning: Widening the support provided to developers11
The Prevent-Model: Human and Organizational Factors Fostering Engineering of Safe and Secure Robotic Systems11
Evaluating software security maturity using OWASP SAMM: Different approaches and stakeholders perceptions11
Effective software security enhancement using an improved PointNet++11
Ensemble Effort Estimation: An updated and extended systematic literature review11
BIT: A template-based approach to incremental and bidirectional model-to-text transformation11
WASMICO: Micro-containers in microcontrollers with WebAssembly11
The influence of the city metaphor and its derivates in software visualization11
On the evaluation of usability design guidelines for improving network monitoring tools interfaces11
Symbolic testing of floating-point bugs and exceptions11
Automatic testing of runtime enforcers with Test4Enforcers10
Understanding Roxygen package documentation in R10
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness10
Improving the performance of software fault localization with effective coverage data reduction techniques10
Piloting Copilot, Codex, and StarCoder2: Hot temperature, cold prompts, or black magic?10
FedMVA: Enhancing software vulnerability assessment via federated multimodal learning10
Variable-strength combinatorial testing of exported activities based on misexposure prediction10
Promoting open science in test-driven software experiments10
Towards an understanding of intra-defect associations: Implications for defect prediction10
Variability modules10
0.034570932388306