Information and Software Technology

Papers
(The median citation count of Information and Software Technology is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation264
Feature-based insight for forks in social coding platforms228
Automatically inferring user behavior models in large-scale web applications166
CADV: A software visualization approach for code annotations distribution132
Recruiting credible participants for field studies in software engineering research113
A systematic review of shared personal informatics101
Early prediction for merged vs abandoned code changes in modern code reviews96
Finding the best learning to rank algorithms for effort-aware defect prediction91
What do developers consider magic literals? A smalltalk perspective91
A Delphi study to recognize and assess systems of systems vulnerabilities84
A vulnerability detection framework by focusing on critical execution paths72
Burnout in software engineering: A systematic mapping study65
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks63
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks58
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications55
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation53
Processes, challenges and recommendations of Gray Literature Review: An experience report50
A systematic literature review of agile software development projects48
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning48
Ambiguity in user stories: A systematic literature review47
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains47
An end-to-end deep learning system for requirements classification using recurrent neural networks46
Exploring continual learning in code intelligence with domain-wise distilled prompts45
Editorial Board45
Context2Vector: Accelerating security event triage via context representation learning44
Exploring the use of LLMs for the selection phase in systematic literature studies43
Warnings: Violation symptoms indicating architecture erosion42
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems40
Improved measurement of software development effort estimation bias40
A hybrid model for efficient decision-making in self-adaptive systems39
An exploratory study of bug prediction at the method level38
Leveraging execution traces to enhance traceability links recovery in BPMN models38
A model-driven approach to reengineering processes in cloud computing38
Threats to validity in software engineering research: A critical reflection37
A survey of selected characteristics and contexts of the analysis and planning phase of software development projects and their connections to project success36
Introduction to software architecture for quantum computing systems special issue34
Requirements engineering for older adult digital health software: A systematic literature review33
To group or not to group? Group sizes for requirements elicitation32
Editorial Board32
Editorial Board32
Editorial Board32
An alternative to code comment generation? Generating comment from bytecode31
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing31
Test Code Flakiness in Mobile Apps: The Developer’s Perspective31
Detecting privacy requirements from User Stories with NLP transfer learning models31
An empirical study of emoji use in software development communication31
Prioritisation of code clones using a genetic algorithm30
Towards automating self-admitted technical debt repayment30
Graph-based code semantics learning for efficient semantic code clone detection30
Comparison of multi-criteria decision-making methods for online controlled experiments in a launch decision-making framework29
AntiPhishX: An AI-Driven Service-Oriented Ensemble Framework for Detecting Phishing and AI-Powered Phishing Attacks29
Automatically repairing tensor shape faults in deep learning programs28
A multi-objective agile project planning model and a comparative meta-heuristic approach28
Coverage-enhanced fault diagnosis for Deep Learning programs: A learning-based approach with hybrid metrics28
Representation-based fairness evaluation and bias correction robustness assessment in neural networks28
Investigating replication challenges through multiple replications of an experiment28
Personalizing label prediction for GitHub issues27
UX Research practices related to Long-Term UX: A Systematic Literature Review27
A brief note, with thanks, on the contributions of Guenther Ruhe26
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm26
Improving effort-aware defect prediction by directly learning to rank software modules26
Dev2vec: Representing domain expertise of developers in an embedding space26
Graph-based explainable vulnerability prediction25
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security24
Short communication: Evolution of secondary studies in software engineering24
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?24
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement24
Causal reasoning in Software Quality Assurance: A systematic review24
Developers’ viewpoints to avoid bug-introducing changes24
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation23
Fairness on a budget, across the board: A cost-effective evaluation of fairness-aware practices across contexts, tasks, and sensitive attributes23
Towards a taxonomy of code review smells23
Community smells—The sources of social debt: A systematic literature review23
Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations23
An exploratory study of software artifacts on GitHub from the lens of documentation22
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines22
Overlapping community detection in software ecosystem based on pheromone guided personalized PageRank algorithm22
Microservice-based projects in agile world: A structured interview22
Introduction to the Special Issue on: Grey Literature and Multivocal Literature Reviews (MLRs) in software engineering22
Skills development for software engineers: Systematic literature review21
Introduction to the special issue on managing software processes using soft computing techniques21
Cross-Modal Retrieval-enhanced code Summarization based on joint learning for retrieval and generation21
Genetic model-based success probability prediction of quantum software development projects21
A systematic mapping study on graph machine learning for static source code analysis20
A low-code assessment platform for urban digital twins20
FCTree: Visualization of function calls in execution20
An expressive and modular layer activation mechanism for Context-Oriented Programming20
A mixed method study of DevOps challenges20
MT-Nod: Metamorphic testing for detecting non-optimal decisions of autonomous driving systems in interactive scenarios20
Impact of software development processes on the outcomes of student computing projects: A tale of two universities20
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies19
Dynamic robustness evaluation for automated model selection in operation19
Editorial Board19
The impact of knowledge inertia on process tailoring in the dynamic development of software projects in Chinese industries19
An information theoretic notion of software testability19
FRL-MFPG: Propagation-aware fault root cause location for microservice intelligent operation and maintenance19
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants19
Editorial Board19
MLOps best practices, challenges and maturity models: A systematic literature review18
Editorial Board18
Investigating the relationship between coordination strategy and coordination effectiveness in agile software development projects18
A survey on Cryptoagility and Agile Practices in the light of quantum resistance18
Application of knowledge graph in software engineering field: A systematic literature review18
A taxonomy of microservice integration techniques18
Data preprocessing for machine learning based code smell detection: A systematic literature review18
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method18
Layered microservices architecture: A multitree-based domain-driven approach18
Automating user-feedback driven requirements prioritization17
Editorial Board17
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success17
Convergence rate of Artificial Neural Networks for estimation in software development projects17
The journey to technical excellence in agile software development17
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing17
Editorial Board17
Exploring the means to measure explainability: Metrics, heuristics and questionnaires17
A random forest model for early-stage software effort estimation for the SEERA dataset17
Antecedents of psychological safety in agile software development teams16
Integrating DSGEO into test case generation for path coverage of MPI programs16
A software vulnerability detection method based on multi-modality with unified processing16
Studying the challenges of developing hardware description language programs16
Editorial Board16
JIT-CF: Integrating contrastive learning with feature fusion for enhanced just-in-time defect prediction16
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning16
On the use of contextual information for machine learning based test case prioritization in continuous integration development16
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information16
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?16
SE3M: A model f16
Equitable Cybersecurity: Towards generating requirements through the lens of security literacy15
Does it matter who pays back Technical Debt? An empirical study of self-fixed TD15
Towards antifragility of cloud systems: An adaptive chaos driven framework15
Are your apps accessible? A GCN-based accessibility checker for low vision users15
Multi-source cross-domain vulnerability detection based on code pre-trained model15
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review15
Service Design Handover to user experience design – a systematic literature review15
Preventing technical debt with the TAP framework for Technical Debt Aware Management15
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics15
Information and software technology: Special section on techdebt 202115
When should we (not) use the mean magnitude of relative error (MMRE) as an error measure in software development effort estimation?15
A multiple case study on reuse in Game Software Engineering15
Case study identification: A trivial indicator outperforms human classifiers15
Reinforcement learning for test case prioritization based on LLEed K-means clustering and dynamic priority factor14
How far are we from reproducible research on code smell detection? A systematic literature review14
A software product line approach for developing hybrid software systems14
Making vulnerability prediction more practical: Prediction, categorization, and localization14
The yea-paradox: Cognitive bias in technology acceptance surveys14
A systematic literature review of capstone courses in software engineering14
Test case recommendation based on balanced distance of test targets14
The need for more informative defect prediction: A systematic literature review14
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network14
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review14
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network14
Context-based statement-level vulnerability localization14
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities14
Uncertainty propagation from sensor data to deep learning models in autonomous driving13
Memorization and generalization in neural code intelligence models13
Code smell detection using feature selection and stacking ensemble: An empirical investigation13
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling13
“Won’t We Fix this Issue?” Qualitative characterization and automated identification of wontfix issues on GitHub13
Editorial Board13
Studying logging practice in machine learning-based applications13
Requirements engineering: Foundation for software quality (REFSQ2020)13
Speeding up constraint-based program repair using a search-based technique13
Assessing and improving syntactic adversarial robustness of pre-trained models for code translation13
Like, dislike, or just do it? How developers approach software development tasks13
Transparency and explainability of AI systems: From ethical guidelines to requirements12
CLeBPI: Contrastive Learning for Bug Priority Inference12
Introduction to the Special Section on the Best Papers from REFSQ 202212
An empirical study on capability of Large Language Models in understanding code semantics12
SHSE: A subspace hybrid sampling ensemble method for software defect number prediction12
Don’t settle for the first! How many GitHub Copilot solutions should you check?12
Editorial Board12
Successful combination of database search and snowballing for identification of primary studies in systematic literature studies12
Native cross-platform app development using the SequalsK transpiler12
Understanding the product knowledge acquisition process in multiprovider software evolution scenarios: An exploratory study12
Case study identification with GPT-4 and implications for mapping studies12
Predicting the precise number of software defects: Are we there yet?12
Negative effects of gamification in education software: Systematic mapping and practitioner perceptions12
Double-counting in software engineering tertiary studies — An overlooked threat to validity12
Introduction to the special issue on dependable systems and applications12
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding12
How do software practitioners perceive human-centric defects?12
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code12
Information needs and presentation in agile software development11
Dealing with imbalanced data for interpretable defect prediction11
Inferring data model from service interactions for response generation in service virtualization11
An empirical study on secure usage of mobile health apps: The attack simulation approach11
Progress on class integration test order generation approaches: A systematic literature review11
An empirical study on ML DevOps adoption trends, efforts, and benefits analysis11
A systematic mapping study of bug reproduction and localization11
Machine translation-based fine-grained comments generation for solidity smart contracts11
Visualizations for the evolution of Variant-Rich Systems: A systematic mapping study11
Editorial Board11
A search-based framework for automatic generation of testing environments for cyber–physical systems11
Fine-tuning and prompt engineering for large language models-based code review automation11
An empirical study on self-admitted technical debt in modern code review11
Probabilistic program performance analysis with confidence intervals11
The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering11
Why and how do organizations create user-led open source consortia? A systematic literature review10
How do practitioners gain confidence in assurance cases?10
Job satisfaction in agile information systems development: A stakeholder perspective10
Issues-Driven features for software fault prediction10
The impact of using biased performance metrics on software defect prediction research10
Code review guidelines for GUI-based testing artifacts10
Unveiling security weaknesses in autonomous driving systems: An in-depth empirical study10
Relating team atmosphere and group dynamics to student software development teams’ performance10
Metamorphic testing of OpenStreetMap10
Reporting case studies in systematic literature studies—An evidential problem10
Guidelines for the development of a critical software under emergency10
Many-objective optimization of non-functional attributes based on refactoring of software models10
On preserving the behavior in software refactoring: A systematic mapping study10
Enabling efficient and low-effort decentralized federated learning with the EdgeFL framework10
The discovery effort worthiness index: How much product discovery should you do and how can this be integrated into delivery?10
Understanding how early-stage researchers leverage socio-technical affordances for distributed research support10
Aligned metric representation based balanced multiset ensemble learning for heterogeneous defect prediction10
A deep learning-based automated framework for functional User Interface testing10
Copiloting the future: How generative AI transforms Software Engineering10
An investigation of causes and effects of trust in Boundary Artefacts10
Squeeziness for non-deterministic systems10
RoseMatcher: Identifying the impact of user reviews on app updates10
Predicting vulnerability inducing function versions using node embeddings and graph neural networks9
Review4Repair: Code review aided automatic program repairing9
Using clarification questions to improve software developers’ Web search9
Parallel evolutionary test case generation for web applications9
Automated description generation for software patches9
Locality-based security bug report identification via active learning9
The lifecycle of Technical Debt that manifests in both source code and issue trackers9
Programming language implementations for context-oriented self-adaptive systems9
A Systematic Literature Review on prioritizing software test cases using Markov chains9
Prioritizing user concerns in app reviews – A study of requests for new features, enhancements and bug fixes9
A socio-technical perspective on software vulnerabilities: A causal analysis9
A unifying framework for the systematic analysis of Git workflows9
A longitudinal study on the temporal validity of software samples9
SENEM: A software engineering-enabled educational metaverse9
Improving domain-specific neural code generation with few-shot meta-learning9
Impact of minimum viable product on software ecosystem failure9
Special issue on causal modeling and inference in SE9
A study of Scrum @ S&P Global in the post-COVID-19 era: Unsuitable for remote work or just flawed implementation?9
Search-based approaches to optimizing software product line architectures: A systematic literature review9
MDSSED: A safety and security enhanced model-driven development approach for smart home apps8
Knowledge and research mapping of the data and database forensics domains: A bibliometric analysis8
E-code: Mastering efficient code generation through pretrained models and expert encoder group8
BERT- and TF-IDF-based feature extraction for long-lived bug prediction in FLOSS: A comparative study8
Towards privacy compliance: A design science study in a small organization8
Making existing software quantum safe: A case study on IBM Db28
A modeling assistant to manage technical debt in coupled evolution8
Improving bug triage with the bug personalized tossing relationship8
Summarizing source code with hierarchical code representation8
Open source oriented cross-platform survey8
What problems are MLOps practitioners talking about? A study of discussions in Stack Overflow forum and GitHub projects8
Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 291008
0.26323699951172