A systematic map** study on technical debt and its management

Z Li, P Avgeriou, P Liang - Journal of Systems and Software, 2015 - Elsevier
Context Technical debt (TD) is a metaphor reflecting technical compromises that can yield
short-term benefit but may hurt the long-term health of a software system. Objective This …

Software security patch management-A systematic literature review of challenges, approaches, tools and practices

N Dissanayake, A Jayatilaka, M Zahedi… - Information and Software …, 2022 - Elsevier
Context: Software security patch management purports to support the process of patching
known software security vulnerabilities. Patching security vulnerabilities in large and …

Microservice architecture reconstruction and visualization techniques: A review

T Cerny, AS Abdelfattah, V Bushong… - … on Service-Oriented …, 2022 - ieeexplore.ieee.org
Microservice system solutions are now mainstream. The older microservices-based systems
are not more than 15 years old, and their architecture is by far different than the one …

Smart city applications to promote citizen participation in city management and governance: A systematic review

D Bastos, A Fernández-Caballero, A Pereira… - Informatics, 2022 - mdpi.com
This systematic review aimed to provide a comprehensive view of (1) the purposes of
research studies using smart city infrastructures to promote citizen participation in the cities' …

A review of code smell mining techniques

G Rasool, Z Arshad - Journal of Software: Evolution and …, 2015 - Wiley Online Library
Over the past 15 years, researchers presented numerous techniques and tools for mining
code smells. It is imperative to classify, compare, and evaluate existing techniques and tools …

Systematic literature review on cyber situational awareness visualizations

L Jiang, A Jayatilaka, M Nasim, M Grobler… - Ieee …, 2022 - ieeexplore.ieee.org
The dynamics of cyber threats are increasingly complex, making it more challenging than
ever for organizations to obtain in-depth insights into their cyber security status. Therefore …

A multi-vocal review of security orchestration

C Islam, MA Babar, S Nepal - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Organizations use diverse types of security solutions to prevent cyber-attacks. Multiple
vendors provide security solutions developed using heterogeneous technologies and …

Understanding software architecture erosion: A systematic map** study

R Li, P Liang, M Soliman… - Journal of Software …, 2022 - Wiley Online Library
Abstract Architecture erosion (AEr) can adversely affect software development and has
received significant attention in the last decade. However, there is an absence of a …

A systematic literature review of software visualization evaluation

L Merino, M Ghafari, C Anslow, O Nierstrasz - Journal of systems and …, 2018 - Elsevier
Context: Software visualizations can help developers to analyze multiple aspects of complex
software systems, but their effectiveness is often uncertain due to the lack of evaluation …

A systematic map** study on the combination of software architecture and agile development

C Yang, P Liang, P Avgeriou - Journal of Systems and Software, 2016 - Elsevier
Context Combining software architecture and agile development has received significant
attention in recent years. However, there exists no comprehensive overview of the state of …