Information and Software Technology

Papers
(The TQCC of Information and Software Technology is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
A Delphi study to recognize and assess systems of systems vulnerabilities275
Beyond the lab: An in-depth analysis of real-world practices in government-to-citizen software user documentation239
Automatically inferring user behavior models in large-scale web applications179
Feature-based insight for forks in social coding platforms146
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks117
CADV: A software visualization approach for code annotations distribution105
Recruiting credible participants for field studies in software engineering research100
A systematic review of shared personal informatics97
Early prediction for merged vs abandoned code changes in modern code reviews85
What do developers consider magic literals? A smalltalk perspective73
Finding the best learning to rank algorithms for effort-aware defect prediction69
A vulnerability detection framework by focusing on critical execution paths68
Software defect prediction with semantic and structural information of codes based on Graph Neural Networks61
Burnout in software engineering: A systematic mapping study59
Boosting input data sequences generation for testing EFSM-specified systems using deep reinforcement learning58
Ambiguity in user stories: A systematic literature review56
A systematic literature review of agile software development projects52
Editorial Board49
A hybrid model for efficient decision-making in self-adaptive systems49
Exploring continual learning in code intelligence with domain-wise distilled prompts49
An end-to-end deep learning system for requirements classification using recurrent neural networks49
Warnings: Violation symptoms indicating architecture erosion46
Vulnerability detection with Graph Attention Network and Metric Learning45
An exploratory study of bug prediction at the method level45
Exploring the use of LLMs for the selection phase in systematic literature studies44
Improved measurement of software development effort estimation bias43
Energize sustainability: EnSAF for sustainability aware, software intensive energy management systems42
A model-driven approach to reengineering processes in cloud computing41
Context2Vector: Accelerating security event triage via context representation learning40
SFIDMT-ART: A metamorphic group generation method based on Adaptive Random Testing applied to source and follow-up input domains40
A survey of coverage-guided greybox fuzzing with deep neural models38
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation38
Leveraging execution traces to enhance traceability links recovery in BPMN models36
UXH-GEDAPP: A set of user experience heuristics for evaluating generative design applications35
Threats to validity in software engineering research: A critical reflection35
Editorial Board33
Requirements engineering for older adult digital health software: A systematic literature review33
A survey of selected characteristics and contexts of the analysis and planning phase of software development projects and their connections to project success33
Introduction to software architecture for quantum computing systems special issue33
To group or not to group? Group sizes for requirements elicitation33
Extraction and empirical evaluation of GUI-level invariants as GUI Oracles in mobile app testing32
Editorial Board32
Editorial Board32
An empirical study of emoji use in software development communication31
A multi-objective agile project planning model and a comparative meta-heuristic approach30
Prioritisation of code clones using a genetic algorithm30
Test Code Flakiness in Mobile Apps: The Developer’s Perspective30
An alternative to code comment generation? Generating comment from bytecode30
Graph-based code semantics learning for efficient semantic code clone detection29
Towards automating self-admitted technical debt repayment29
Comparison of multi-criteria decision-making methods for online controlled experiments in a launch decision-making framework29
Detecting privacy requirements from User Stories with NLP transfer learning models29
Towards a taxonomy of code review smells28
Automatically repairing tensor shape faults in deep learning programs27
Coverage-enhanced fault diagnosis for Deep Learning programs: A learning-based approach with hybrid metrics27
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security27
Investigating replication challenges through multiple replications of an experiment27
UX Research practices related to Long-Term UX: A Systematic Literature Review27
Developers’ viewpoints to avoid bug-introducing changes26
Graph-based explainable vulnerability prediction26
A brief note, with thanks, on the contributions of Guenther Ruhe26
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm25
Can an old fashioned feature extraction and a light-weight model improve vulnerability type identification performance?25
Short communication: Evolution of secondary studies in software engineering25
Causal reasoning in Software Quality Assurance: A systematic review25
Dev2vec: Representing domain expertise of developers in an embedding space25
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement24
Objectivity by design: The impact of AI-driven approach on employees' soft skills evaluation24
Community smells—The sources of social debt: A systematic literature review24
Usefulness and usability of heuristic walkthroughs for evaluating domain-specific developer tools in industry: Evidence from four field simulations24
An exploratory study of software artifacts on GitHub from the lens of documentation24
Personalizing label prediction for GitHub issues23
Overlapping community detection in software ecosystem based on pheromone guided personalized PageRank algorithm23
Improving effort-aware defect prediction by directly learning to rank software modules23
Introduction to the special issue on managing software processes using soft computing techniques22
Genetic model-based success probability prediction of quantum software development projects22
Introduction to the Special Issue on: Grey Literature and Multivocal Literature Reviews (MLRs) in software engineering22
DFL: A DOM sample generation oriented fuzzing framework for browser rendering engines22
Cross-Modal Retrieval-enhanced code Summarization based on joint learning for retrieval and generation22
An expressive and modular layer activation mechanism for Context-Oriented Programming21
A mixed method study of DevOps challenges21
FCTree: Visualization of function calls in execution21
A low-code assessment platform for urban digital twins21
Skills development for software engineers: Systematic literature review21
Impact of software development processes on the outcomes of student computing projects: A tale of two universities21
A systematic mapping study on graph machine learning for static source code analysis21
Editorial Board20
FRL-MFPG: Propagation-aware fault root cause location for microservice intelligent operation and maintenance20
Microservice-based projects in agile world: A structured interview20
MT-Nod: Metamorphic testing for detecting non-optimal decisions of autonomous driving systems in interactive scenarios20
Leveraging a combination of machine learning and formal concept analysis to locate the implementation of features in software variants19
Editorial Board19
Application of knowledge graph in software engineering field: A systematic literature review19
Dynamic robustness evaluation for automated model selection in operation19
Automating user-feedback driven requirements prioritization19
An information theoretic notion of software testability19
A random forest model for early-stage software effort estimation for the SEERA dataset18
DLRegion: Coverage-guided fuzz testing of deep neural networks with region-based neuron selection strategies18
Constrained detecting arrays: Mathematical structures for fault identification in combinatorial interaction testing18
A survey on Cryptoagility and Agile Practices in the light of quantum resistance18
Technical risk model of machine learning based software project development - A multinational empirical study using modified Delphi-AHP method18
A taxonomy of microservice integration techniques18
Investigating the relationship between coordination strategy and coordination effectiveness in agile software development projects18
Data preprocessing for machine learning based code smell detection: A systematic literature review18
Layered microservices architecture: A multitree-based domain-driven approach18
Perceived impact of agile principles: Insights from a survey-based study on agile software development project success18
MLOps best practices, challenges and maturity models: A systematic literature review18
Editorial Board18
Exploring the means to measure explainability: Metrics, heuristics and questionnaires17
Does it smell? A homogeneous stacking approach for code smell prediction17
Integrating DSGEO into test case generation for path coverage of MPI programs17
A software vulnerability detection method based on multi-modality with unified processing17
The impact of knowledge inertia on process tailoring in the dynamic development of software projects in Chinese industries17
Crex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics17
JIT-CF: Integrating contrastive learning with feature fusion for enhanced just-in-time defect prediction17
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning17
Convergence rate of Artificial Neural Networks for estimation in software development projects17
Editorial Board17
Editorial Board17
On the use of contextual information for machine learning based test case prioritization in continuous integration development17
Editorial Board17
SE3M: A model f16
Studying the challenges of developing hardware description language programs16
Human error management in requirements engineering: Should we fix the people, the processes, or the environment?16
PAREI: A progressive approach for Web API recommendation by combining explicit and implicit information16
Multi-source cross-domain vulnerability detection based on code pre-trained model16
When should we (not) use the mean magnitude of relative error (MMRE) as an error measure in software development effort estimation?16
Antecedents of psychological safety in agile software development teams16
The journey to technical excellence in agile software development16
The need for more informative defect prediction: A systematic literature review15
A software product line approach for developing hybrid software systems15
Information and software technology: Special section on techdebt 202115
Service Design Handover to user experience design – a systematic literature review15
Are your apps accessible? A GCN-based accessibility checker for low vision users15
Vulnerability detection with feature fusion and learnable edge-type embedding graph neural network15
Towards antifragility of cloud systems: An adaptive chaos driven framework15
Reinforcement learning for test case prioritization based on LLEed K-means clustering and dynamic priority factor15
Case study identification: A trivial indicator outperforms human classifiers15
A multiple case study on reuse in Game Software Engineering15
Alternatives for testing of context-aware software systems in non-academic settings: results from a Rapid Review15
Does it matter who pays back Technical Debt? An empirical study of self-fixed TD15
Making vulnerability prediction more practical: Prediction, categorization, and localization15
The yea-paradox: Cognitive bias in technology acceptance surveys14
Context-based statement-level vulnerability localization14
Negative effects of gamification in education software: Systematic mapping and practitioner perceptions14
Diversity-aware fairness testing of machine learning classifiers through hashing-based sampling14
Test case recommendation based on balanced distance of test targets14
Synthesizing research on programmers’ mental models of programs, tasks and concepts — A systematic literature review14
Preventing technical debt with the TAP framework for Technical Debt Aware Management14
Like, dislike, or just do it? How developers approach software development tasks14
Editorial Board14
HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities14
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network14
A systematic literature review of capstone courses in software engineering14
Uncertainty propagation from sensor data to deep learning models in autonomous driving14
“Won’t We Fix this Issue?” Qualitative characterization and automated identification of wontfix issues on GitHub14
Speeding up constraint-based program repair using a search-based technique13
Memorization and generalization in neural code intelligence models13
Successful combination of database search and snowballing for identification of primary studies in systematic literature studies13
Editorial Board13
How far are we from reproducible research on code smell detection? A systematic literature review13
Studying logging practice in machine learning-based applications13
Introduction to the special issue on dependable systems and applications13
CLeBPI: Contrastive Learning for Bug Priority Inference13
Code smell detection using feature selection and stacking ensemble: An empirical investigation13
Assessing and improving syntactic adversarial robustness of pre-trained models for code translation13
Transparency and explainability of AI systems: From ethical guidelines to requirements13
Understanding the product knowledge acquisition process in multiprovider software evolution scenarios: An exploratory study13
Native cross-platform app development using the SequalsK transpiler12
Case study identification with GPT-4 and implications for mapping studies12
An empirical study on capability of Large Language Models in understanding code semantics12
Machine translation-based fine-grained comments generation for solidity smart contracts12
SHSE: A subspace hybrid sampling ensemble method for software defect number prediction12
A systematic mapping study of bug reproduction and localization12
Introduction to the Special Section on the Best Papers from REFSQ 202212
How do software practitioners perceive human-centric defects?12
Information needs and presentation in agile software development12
Don’t settle for the first! How many GitHub Copilot solutions should you check?12
Dealing with imbalanced data for interpretable defect prediction12
An empirical study on self-admitted technical debt in modern code review12
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding12
Double-counting in software engineering tertiary studies — An overlooked threat to validity12
DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code12
A search-based framework for automatic generation of testing environments for cyber–physical systems12
Predicting the precise number of software defects: Are we there yet?12
The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering11
Why and how do organizations create user-led open source consortia? A systematic literature review11
Squeeziness for non-deterministic systems11
Progress on class integration test order generation approaches: A systematic literature review11
An empirical study on secure usage of mobile health apps: The attack simulation approach11
Trust, transparency, and adoption in generative AI for software engineering: Insights from Twitter discourse11
An investigation of causes and effects of trust in Boundary Artefacts11
Many-objective optimization of non-functional attributes based on refactoring of software models11
Fine-tuning and prompt engineering for large language models-based code review automation11
Inferring data model from service interactions for response generation in service virtualization11
Editorial Board11
Metamorphic testing of OpenStreetMap11
Unveiling security weaknesses in autonomous driving systems: An in-depth empirical study11
An empirical study on ML DevOps adoption trends, efforts, and benefits analysis11
Probabilistic program performance analysis with confidence intervals11
0.10947418212891