nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis
|
Zheng, Wei |
|
|
158 |
C |
p. |
artikel |
2 |
An investigation of causes and effects of trust in Boundary Artefacts
|
Ouriques, Raquel |
|
|
158 |
C |
p. |
artikel |
3 |
Application of Deep Learning in Software Defect Prediction: Systematic Literature Review and Meta-analysis
|
Zain, Zuhaira Muhammad |
|
|
158 |
C |
p. |
artikel |
4 |
Application of Project-Based Learning to a Software Engineering course in a hybrid class environment
|
Ceh-Varela, Edgar |
|
|
158 |
C |
p. |
artikel |
5 |
Automated event extraction of CVE descriptions
|
Wei, Ying |
|
|
158 |
C |
p. |
artikel |
6 |
Describing the APIs comprehensively: Obtaining the holistic representations from multiple modalities data for different tasks
|
Li, Xun |
|
|
158 |
C |
p. |
artikel |
7 |
Detecting multi-type self-admitted technical debt with generative adversarial network-based neural networks
|
Yu, Jiaojiao |
|
|
158 |
C |
p. |
artikel |
8 |
Double-counting in software engineering tertiary studies — An overlooked threat to validity
|
Börstler, Jürgen |
|
|
158 |
C |
p. |
artikel |
9 |
Editorial Board
|
|
|
|
158 |
C |
p. |
artikel |
10 |
Fault-insertion and fault-fixing behavioural patterns in Apache Software Foundation Projects
|
Ortu, Marco |
|
|
158 |
C |
p. |
artikel |
11 |
Introduction to special issue on Agile UX: challenges, successes and barriers to improvement
|
Schön, Eva-Maria |
|
|
158 |
C |
p. |
artikel |
12 |
It’s about time: How to study intertemporal choice in systems design
|
Fagerholm, Fabian |
|
|
158 |
C |
p. |
artikel |
13 |
Just-in-time code duplicates extraction
|
AlOmar, Eman Abdullah |
|
|
158 |
C |
p. |
artikel |
14 |
Maintainability enhancement based on uncertain model transformations
|
Laghouaouta, Youness |
|
|
158 |
C |
p. |
artikel |
15 |
Microservice extraction using graph deep clustering based on dual view fusion
|
Qian, Lifeng |
|
|
158 |
C |
p. |
artikel |
16 |
Requirements engineering for artificial intelligence systems: A systematic mapping study
|
Ahmad, Khlood |
|
|
158 |
C |
p. |
artikel |
17 |
Scripted and scriptless GUI testing for web applications: An industrial case
|
Bons, Axel |
|
|
158 |
C |
p. |
artikel |
18 |
SedSVD: Statement-level software vulnerability detection based on Relational Graph Convolutional Network with subgraph embedding
|
Dong, Yukun |
|
|
158 |
C |
p. |
artikel |
19 |
Squeeziness for non-deterministic systems
|
Ibias, Alfredo |
|
|
158 |
C |
p. |
artikel |
20 |
Towards an understanding of reliability of software-intensive systems-of-systems
|
Ferreira, Francisco Henrique Cerdeira |
|
|
158 |
C |
p. |
artikel |
21 |
User story extraction from natural language for requirements elicitation: Identify software-related information from online news
|
Siahaan, Daniel |
|
|
158 |
C |
p. |
artikel |