no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A checklist for the evaluation of software process line approaches
|
Agh, Halimeh |
|
|
146 |
C |
p. |
article |
2 |
A Delphi study to recognize and assess systems of systems vulnerabilities
|
Olivero, Miguel A. |
|
|
146 |
C |
p. |
article |
3 |
An empirical study on self-admitted technical debt in modern code review
|
Kashiwa, Yutaro |
|
|
146 |
C |
p. |
article |
4 |
An evaluation of the effectiveness of personalization and self-adaptation for e-Health apps
|
Grua, Eoin Martino |
|
|
146 |
C |
p. |
article |
5 |
Context2Vector: Accelerating security event triage via context representation learning
|
Liu, Jia |
|
|
146 |
C |
p. |
article |
6 |
Detecting privacy requirements from User Stories with NLP transfer learning models
|
Casillo, Francesco |
|
|
146 |
C |
p. |
article |
7 |
Editorial Board
|
|
|
|
146 |
C |
p. |
article |
8 |
Featherweight assisted vulnerability discovery
|
Binkley, David |
|
|
146 |
C |
p. |
article |
9 |
Leveraging execution traces to enhance traceability links recovery in BPMN models
|
Lapeña, Raúl |
|
|
146 |
C |
p. |
article |
10 |
Predicting reliability of software in industrial systems using a Petri net based approach: A case study on a safety system used in nuclear power plant
|
Kumar, Kuldeep |
|
|
146 |
C |
p. |
article |
11 |
Predicting the precise number of software defects: Are we there yet?
|
Yu, Xiao |
|
|
146 |
C |
p. |
article |
12 |
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm
|
AbuHassan, Amjad |
|
|
146 |
C |
p. |
article |
13 |
Speeding up constraint-based program repair using a search-based technique
|
Yi, Jooyong |
|
|
146 |
C |
p. |
article |
14 |
Tailoring the Scrum framework for software development: Literature mapping and feature-based support
|
Garcia, Luciano A. |
|
|
146 |
C |
p. |
article |
15 |
Towards privacy compliance: A design science study in a small organization
|
Li, Ze Shi |
|
|
146 |
C |
p. |
article |