nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A checklist for the evaluation of software process line approaches
|
Agh, Halimeh |
|
|
146 |
C |
p. |
artikel |
2 |
A Delphi study to recognize and assess systems of systems vulnerabilities
|
Olivero, Miguel A. |
|
|
146 |
C |
p. |
artikel |
3 |
An empirical study on self-admitted technical debt in modern code review
|
Kashiwa, Yutaro |
|
|
146 |
C |
p. |
artikel |
4 |
An evaluation of the effectiveness of personalization and self-adaptation for e-Health apps
|
Grua, Eoin Martino |
|
|
146 |
C |
p. |
artikel |
5 |
Context2Vector: Accelerating security event triage via context representation learning
|
Liu, Jia |
|
|
146 |
C |
p. |
artikel |
6 |
Detecting privacy requirements from User Stories with NLP transfer learning models
|
Casillo, Francesco |
|
|
146 |
C |
p. |
artikel |
7 |
Editorial Board
|
|
|
|
146 |
C |
p. |
artikel |
8 |
Featherweight assisted vulnerability discovery
|
Binkley, David |
|
|
146 |
C |
p. |
artikel |
9 |
Leveraging execution traces to enhance traceability links recovery in BPMN models
|
Lapeña, Raúl |
|
|
146 |
C |
p. |
artikel |
10 |
Predicting reliability of software in industrial systems using a Petri net based approach: A case study on a safety system used in nuclear power plant
|
Kumar, Kuldeep |
|
|
146 |
C |
p. |
artikel |
11 |
Predicting the precise number of software defects: Are we there yet?
|
Yu, Xiao |
|
|
146 |
C |
p. |
artikel |
12 |
Prioritization of model smell refactoring using a covariance matrix-based adaptive evolution algorithm
|
AbuHassan, Amjad |
|
|
146 |
C |
p. |
artikel |
13 |
Speeding up constraint-based program repair using a search-based technique
|
Yi, Jooyong |
|
|
146 |
C |
p. |
artikel |
14 |
Tailoring the Scrum framework for software development: Literature mapping and feature-based support
|
Garcia, Luciano A. |
|
|
146 |
C |
p. |
artikel |
15 |
Towards privacy compliance: A design science study in a small organization
|
Li, Ze Shi |
|
|
146 |
C |
p. |
artikel |