A systematic map** study on technical debt and its management
Context Technical debt (TD) is a metaphor reflecting technical compromises that can yield
short-term benefit but may hurt the long-term health of a software system. Objective This …
short-term benefit but may hurt the long-term health of a software system. Objective This …
Software security patch management-A systematic literature review of challenges, approaches, tools and practices
Context: Software security patch management purports to support the process of patching
known software security vulnerabilities. Patching security vulnerabilities in large and …
known software security vulnerabilities. Patching security vulnerabilities in large and …
Microservice architecture reconstruction and visualization techniques: A review
Microservice system solutions are now mainstream. The older microservices-based systems
are not more than 15 years old, and their architecture is by far different than the one …
are not more than 15 years old, and their architecture is by far different than the one …
Smart city applications to promote citizen participation in city management and governance: A systematic review
This systematic review aimed to provide a comprehensive view of (1) the purposes of
research studies using smart city infrastructures to promote citizen participation in the cities' …
research studies using smart city infrastructures to promote citizen participation in the cities' …
A review of code smell mining techniques
G Rasool, Z Arshad - Journal of Software: Evolution and …, 2015 - Wiley Online Library
Over the past 15 years, researchers presented numerous techniques and tools for mining
code smells. It is imperative to classify, compare, and evaluate existing techniques and tools …
code smells. It is imperative to classify, compare, and evaluate existing techniques and tools …
Systematic literature review on cyber situational awareness visualizations
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …
A multi-vocal review of security orchestration
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …
vendors provide security solutions developed using heterogeneous technologies and …
Understanding software architecture erosion: A systematic map** study
Abstract Architecture erosion (AEr) can adversely affect software development and has
received significant attention in the last decade. However, there is an absence of a …
received significant attention in the last decade. However, there is an absence of a …
A systematic literature review of software visualization evaluation
Context: Software visualizations can help developers to analyze multiple aspects of complex
software systems, but their effectiveness is often uncertain due to the lack of evaluation …
software systems, but their effectiveness is often uncertain due to the lack of evaluation …
A systematic map** study on the combination of software architecture and agile development
Context Combining software architecture and agile development has received significant
attention in recent years. However, there exists no comprehensive overview of the state of …
attention in recent years. However, there exists no comprehensive overview of the state of …