Information and Software Technology

Papers
(The H4-Index of Information and Software Technology is 37. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation412
A systematic review of shared personal informatics334
Uncovering challenges of cybersecurity cross-regulation in EU legislation284
A vulnerability detection framework by focusing on critical execution paths250
Finding the best learning to rank algorithms for effort-aware defect prediction133
Recruiting credible participants for field studies in software engineering research131
CADV: A software visualization approach for code annotations distribution96
Unsupervised, robust, and lightweight detection of data pattern anomalies and outliers94
Burnout in software engineering: A systematic mapping study92
Metamorphic Testing of Multimodal Human Trajectory Prediction90
LocVul: Line-level vulnerability localization based on a Sequence-to-Sequence approach88
Gamified or Glorified? A systematic review of serious games for security & privacy in the SDLC85
What do developers consider magic literals? A smalltalk perspective79
Taxonomy of Cybersecurity Challenges and Solutions for the Superintelligent Systems77
A Delphi study to recognize and assess systems of systems vulnerabilities70
User-centric requirements prioritization in mHealth applications: Insights from a Discrete Choice Experiment62
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks59
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains57
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks57
Leveraging execution traces to enhance traceability links recovery in BPMN models56
Context2Vector: Accelerating security event triage via context representation learning55
EdgeSim: Firmware vulnerability detection with control transfer-enhanced binary code similarity detection53
GNPSum: A code summarization enhancement framework based on Graph Node Position51
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning51
Warnings: Violation symptoms indicating architecture erosion48
A survey of coverage-guided greybox fuzzing with deep neural models45
Exploring continual learning in code intelligence with domain-wise distilled prompts45
Improved measurement of software development effort estimation bias44
Editorial Board43
Research artifacts in secondary studies: A systematic mapping in software engineering42
Ambiguity in user stories: A systematic literature review42
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications41
Vulnerability detection with Graph Attention Network and Metric Learning39
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation38
A systematic literature review of agile software development projects37
CSJSS: Augmenting code summarization with joint structural semantic of abstract syntax trees37
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems37
VulATMHD: Joint adaptive triplet mining and hybrid distillation for type-aware vulnerability classification37
An end-to-end deep learning system for requirements classification using recurrent neural networks37
A hybrid model for efficient decision-making in self-adaptive systems37
0.096651077270508