International Journal of Software Engineering and Knowledge Engineerin

Papers
(The TQCC of International Journal of Software Engineering and Knowledge Engineerin is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
RESEARCH NOTES—GMRepair: Graph Mining Template-Based Automated Software Repair21
Automated Test Case Generation for Path Coverage by Using Multi-Objective Particle Swarm Optimization Algorithm with Reinforcement Learning and Relationship Matrix Strategies15
A Dual Relaxation Method for Neural Network Verification13
Software Quality Assessment Model: A New Approach for Software Testing Tools11
Aligning Software Architecture Training with Software Industry Requirements10
Guest Editorial Special Issue on Best Papers from SEKE20229
An Optimal WSN Coverage Based on Adapted Transit Search Algorithm7
Graph-Based Root Cause Localization in Microservice Systems with Protection Mechanisms7
An Extensible Modeling Method Supporting Ontology-Based Scenario Specification and Domain-Specific Extension7
Mapping Modern JVM Language Code to Analysis-Friendly Graphs: A Study with Kotlin6
Model-Driven Approach for Making Citizen Science Data FAIR6
Matching Logic Based on Ownership Transfer6
SWEBOK Matters: Report and Reflection of a SEKE Panel on the Educational and Professional Implications of SWEBOK6
Memory-Aware Scheduling Parallel Real-Time Tasks for Multicore Systems5
BSR-TC: Adaptively Sampling for Accurate Triangle Counting over Evolving Graph Streams5
The Experience of Tests during the COVID-19 Pandemic-Induced Emergency Remote Teaching5
Personalized API Recommendations5
A Novel Overlapping Method to Alleviate the Cold-Start Problem in Recommendation Systems5
Identifying the Optimal Refactoring Dependencies Using Heuristic Search Algorithms to Maximize Maintainability5
An Efficient Sorting Algorithm for Non-Volatile Memory5
Identifying High-impact Bug Reports with Imbalance Distribution by Instance Fuzzy Entropy4
A Modeling and Verification Method of Cyber-Physical Systems Based on AADL and Process Algebra4
NISe: Non-Invasive Secure Framework for Multi-Access Edge Computing4
An Empirical Study on Higher-Order Mutation-Based Fault Localization4
CodeGen-Search: A Code Generation Model Incorporating Similar Sample Information4
A Dynamic Drilling Sampling Method and Evaluation Model for Big Streaming Data4
Root Cause Analysis of Anomalies Based on Graph Convolutional Neural Network4
Extracting Prerequisite Relations among Concepts From the Course Descriptions4
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning4
OdegVul: An Approach for Statement-Level Defect Prediction4
Using Peer Assessment Leveraging Large Language Models in Software Engineering Education4
Consistency Checking for Refactoring from Coarse-Grained Locks to Fine-Grained Locks3
Multi-Label Classification of Pure Code3
Python API Misuse Mining and Classification Based on Hybrid Analysis and Attention Mechanism3
Video Multimodal Entity Linking via Multi-Perspective Enhanced Subgraph Contrastive Network3
Code Recommendation for Schema Evolution of Mimic Storage Systems3
Function-Level Code Obfuscation Detection Through Self-Attention-Guided Multi-Representation Fusion3
Benchmarking Whole Knowledge Graph Embedding Techniques3
MTCEA: Guiding Multi-modal Entity Alignment via Entity Type Information3
Recommending Relevant Tutorial Fragments for API-Related Natural Language Questions3
Review and Application of Knowledge Graph in Crisis Management3
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm3
VulnTrace: Tracking and Detecting Code Vulnerabilities with Historical Commits and Semantic Embeddings3
Assessing the Use of GitHub Copilot on Students of Engineering of Information Systems3
An Empirical Study on Rule Violation History of JavaScript Code Blocks on Stack Overflow2
The Evolution Mechanism of Correctness for Cyber-Physical System2
An Imperfect Debugging Non-Homogeneous Poisson Process Software Reliability Model Based on a 3-Parameter S-Shaped Function2
Boosting Just-In-Time Code Comment Updating Via Programming Context and Refactor2
Enhancing Multi-Behavior Recommendations Through Capturing Dynamic Preferences2
CodeLabeller: A Web-Based Code Annotation Tool for Java Design Patterns and Summaries2
Automated Localization Testing of Mobile Applications Method2
A Fully Parallel Approach of Model Checking Via Probe Machine2
Augmenting the Interpretability of GraphCodeBERT for Code Similarity Tasks2
Guest Editor’s Introduction2
Toward Proactive Maintenance: A Multi-Tiered Architecture for Industrial Equipment Health Monitoring and Remaining Useful Life Prediction2
Improving Windows Malware Detection Using the Random Forest Algorithm and Multi-View Analysis2
EFSM Model-Based Testing for Android Applications2
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information2
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine2
Forecasting Stock Index Using a Volume-Aware Positional Attention-Based Recurrent Neural Network2
Cross-Project Transfer Learning on Lightweight Code Semantic Graphs for Defect Prediction2
An Adaptive Semantic Annotation Tool for Teachers Based on Context-Aware and Internet of Things2
An Extensible Compiler for Implementing Software Design Patterns as Concise Language Constructs2
Author Index Volume 34 (2024)2
Understanding the Role of Stack Overflow in Supporting Software Development Tasks: A Research Perspective2
Multi-Intent Inline Code Comment Generation via Large Language Model2
DTester: Diversity-Driven Test Case Generation for Web Applications2
Exploring the Impact of Vocabulary Techniques on Code Completion: A Comparative Approach2
Exploring the Impact of Balanced and Imbalanced Learning in Source Code Suggestion2
GTFP: Network Fault Prediction Based on Graph and Time Series2
Modeling of Security Fault-Tolerant Requirements for Secure Systems2
VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications2
EVaDe: Efficient and Lightweight Mirai Variants Detection via Approximate Largest Submatrix Search2
Exact Learning of Qualitative Constraint Networks from Membership Queries2
Quantum Software: The Brain of Quantum — Guest Editor’s Introduction1
MuSim: Mutation-based Fault Localization Using Test Case Proximity1
Equivalent Mutants Detection Based on Weighted Software Behavior Graph1
RR-GCN : exploring untrained random embeddings for relational graphs1
Software Industry Perception of Technical Debt and Its Management1
Methods on Detecting Closely Related Topics and Spatial Events1
Towards Exogenous Coordination of Concurrent Cloud Applications1
Predicting Ride Hailing Service Demand Using Autoencoder and Convolutional Neural Network1
Remaining Activity Sequence Prediction for Ongoing Process Instances1
EFSP: An Enhanced Full Scrum Process Model1
DockerPedia: A Knowledge Graph of Software Images and Their Metadata1
A Hierarchical Model for Quality Evaluation of Mixed Source Software Based on ISO/IEC 250101
The Safety and Performance of Prominent Programming Languages1
From SATD Recognition to an Interpretation Method Based on the Dataset1
Test Oracle Generation Based on BPNN by Using the Values of Variables at Different Breakpoints for Programs1
A Formal Approach for Consistency Management in UML Models1
Statistical Model Checking for Stochastic and Hybrid Autonomous Driving Based on Spatio-Clock Constraints1
Enhancing Reusability: An Integrated Framework for Software Requirements Classification and Prioritization1
An Ensemble Keyword Extraction Model for News Texts with Statistical and Graphical Features1
Flaky Test Detection Based on Adaptive Latest Position Execution for Concurrent Android Applications1
A Dual Decision-Making Continuous Reinforcement Learning Method Based on Sim2Real1
Identifying Possible Improvements of Software Development Life Cycle (SDLC) Process of a Bank by Using Process Mining1
Python Code Smell Refactoring Route Generation Based on Association Rule and Correlation1
A Static Analysis Framework for Investigating Tainted Data Sources in Software Systems1
Deep Understanding of Runtime Configuration Intention1
A Case Study of Software Project Replacement: A Time Series Analysis1
Extension of a Simulation Software to Incorporate Quality-Related Factors in Investigations on Software Engineering Economics1
Software Testing Integration-Based Model (I-BM) Framework for Recognizing Measure Fault Output Accuracy Using Machine Learning Approach1
Identifying Temporal Corpus for Enhanced User Comments Analysis1
Scalable Instance Matching Using Lucene and Mongodb1
Guest Editor’s Introduction1
Knowledge Graph Construction for SOFL Formal Specifications1
MOID: Many-to-One Patent Graph Embedding Base Infringement Detection Model1
Reverse Engineering of Object Oriented Systems to ALF1
Enhancing Code Summarization with Graph Embedding and Pre-Trained Model1
Constructing RDF Knowledge Base with Object-Oriented Databases1
Class Change Prediction by Incorporating Community Smell: An Empirical Study1
An Empirical Study on Bugs in PHP1
Which Exceptions Do We Have to Catch in the Python Code for AI Projects?1
Automatic Analysis of Available Source Code of Top Artificial Intelligence Conference Papers1
Sentiment-Time Heterogeneous Residual Graph Attention Transformer for Session-Based Recommendation1
Applying Scrum to Knowledge Transfer Among Software Developers1
Automatically Generating Release Notes with Content Classification Models1
Guest Editors’ Introduction1
Multiclass Classification of UML Diagrams from Images Using Deep Learning1
BPMN Data Model for Multi-Perspective Process Mining on Blockchain1
How Did COVID-19 Impact Software Design Activities in Global Software Engineering — Systematic Review1
NNTBFV: Simplifying and Verifying Neural Networks Using Testing-Based Formal Verification1
KEMA++: A Full Representative Knowledge-Graph Embedding Model (036)1
Semantic Discovery of Composite GIS Services1
Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security1
Hybrid Model with Multi-Level Code Representation for Multi-Label Code Smell Detection (077)1
Generating Optimal Class Integration Test Orders Using Genetic Algorithms1
A Combined Usage of NLP Libraries Towards Analyzing Software Documents1
Verifiable Model Construction for Business Processes1
XL-BPMN Model-Based Service Similarity Measurement Technique1
Detecting Interaction Related Bugs in a Multi-Tenant Setting Using Kubernetes1
Generation of C++ Code from Isabelle/HOL Specification1
An Ontology-Based Information Extraction System for Residential Land-Use Suitability Analysis1
0.077539920806885