Abstract is missing.
- AI-based Code Generation: Achievements and Open ProblemsGabriele Bavota. 1 [doi]
- Insights Into Test Code Quality Prediction: Managing Machine Learning TechniquesValeria Pontillo. 2 [doi]
- Evidence-Based Research for Supporting Software Security in Software Development: Methodological Challenges & StrategiesMuhammad Ali Babar 0001. 3 [doi]
- The Role of Software Measurement in Assured LLM-Based Software EngineeringMark Harman. 4 [doi]
- Why Large Language Models will (not) Kill Software Engineering ResearchMassimiliano Di Penta. 5 [doi]
- Surfing the AI Wave in Software Engineering: Opportunities and ChallengesNicole Novielli. 6 [doi]
- A Catalog of Transformations to Remove Smells From Natural Language TestsManoel Aranda III, Naelson Oliveira, Elvys Soares, Márcio Ribeiro 0001, Davi Romão, Ullyanne Patriota, Rohit Gheyi, Emerson Souza, Ivan Machado. 7-16 [doi]
- Adversarial Attack and Robustness Improvement on Code SummarizationXi Ding, Yuan Huang 0002, Xiangping Chen, Jing Bian. 17-27 [doi]
- Analyzing Prerequistes of known Deserializtion Vulnerabilities on Java ApplicationsBruno Kreyssig, Alexandre Bartel. 28-37 [doi]
- An Empirically Grounded Reference Architecture for Software Supply Chain Metadata ManagementNguyen Khoi Tran 0001, Samodha Pallewatta, Muhammad Ali Babar 0001. 38-47 [doi]
- An Empirical Study on Code Coverage of Performance TestingMuhammad Imran, Vittorio Cortellessa, Davide Di Ruscio, Riccardo Rubei, Luca Traini. 48-57 [doi]
- An Empirical Study on the Energy Usage and Performance of Pandas and Polars Data Analysis Python LibrariesFelix Nahrstedt, Mehdi Karmouche, Karolina Bargiel, Pouyeh Banijamali, Apoorva Nalini Pradeep Kumar, Ivano Malavolta. 58-68 [doi]
- An Extensive Comparison of Static Application Security Testing ToolsMatteo Esposito, Valentina Falaschi, Davide Falessi. 69-78 [doi]
- A Performance Study of LLM-Generated Code on LeetcodeTristan Coignion, Clément Quinton, Romain Rouvoy. 79-89 [doi]
- A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive?Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 90-99 [doi]
- Code Summarization without Direct Access to Code - Towards Exploring Federated LLMs for Software EngineeringJahnavi Kumar, Sridhar Chimalakonda. 100-109 [doi]
- Context Switch Sensitive Fault LocalizationFerenc Horváth, Roland Aszmann, Péter Attila Soha, Árpád Beszédes, Tibor Gyimóthy. 110-119 [doi]
- Data Quality Assessment in the Wild: Findings from GitHubIpek Ustunboyacioglu, Indika Kumara, Dario Di Nucci, Damian Andrew Tamburri, Willem-Jan van den Heuvel. 120-129 [doi]
- Does trainer gender make a difference when delivering phishing training? A new experimental design to capture biasAndré Palheiros Da Silva, Winnie Mbaka, Johann Mayer, Jan-Willem Bullee, Katja Tuma. 130-139 [doi]
- How Much Logs Does My Source Code File Need? Learning to Predict the Density of LogsMohamed Amine Batoun, Mohammed Sayagh, Ali Ouni 0001. 140-149 [doi]
- How the Training Procedure Impacts the Performance of Deep Learning-based Vulnerability PatchingAntonio Mastropaolo, Vittoria Nardone, Gabriele Bavota, Massimiliano Di Penta. 150-159 [doi]
- Improving classifier-based effort-aware software defect prediction by reducing ranking errorsYuchen Guo, Martin J. Shepperd, Ning Li. 160-169 [doi]
- Issues and Their Causes in WebAssembly Applications: An Empirical StudyMuhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang 0001, Tommi Mikkonen. 170-180 [doi]
- LEGION: Harnessing Pre-trained Language Models for GitHub Topic Recommendations with Distribution-Balance LossYen-Trang Dang, Thanh Le-Cong, Phuc-Thanh Nguyen, Anh M. T. Bui, Phuong T. Nguyen 0001, Bach Le, Quyet Thang Huynh. 181-190 [doi]
- Leveraging Statistical Machine Translation for Code SearchHung Phan, Ali Jannesari. 191-200 [doi]
- LLM-Based Chatbots for Mining Software Repositories: Challenges and OpportunitiesSamuel Abedu, Ahmad Abdellatif, Emad Shihab. 201-210 [doi]
- "Looks Good To Me ;-)": Assessing Sentiment Analysis Tools for Pull Request DiscussionsDaniel Coutinho, Luisa Cito, Maria Vitória Lima, Beatriz Arantes, Juliana Alves Pereira, Johny Arriel, João Godinho, Vinicius Martins, Paulo Vítor C. F. Libório, Leonardo Leite, Alessandro Garcia 0001, Wesley K. G. Assunção, Igor Steinmacher, Augusto Baffa, Baldoino Fonseca. 211-221 [doi]
- Motivation Research Using Labeling FunctionsIdan Amit, Dror G. Feitelson. 222-231 [doi]
- Mutation Testing for Task-Oriented ChatbotsPablo Gómez-Abajo, Sara Pérez-Soler, Pablo C. Cañizares, Esther Guerra, Juan de Lara. 232-241 [doi]
- On the Accuracy of GitHub's Dependency GraphDaniele Bifolco, Sabato Nocera, Simone Romano 0001, Massimiliano Di Penta, Rita Francese, Giuseppe Scanniello. 242-251 [doi]
- Reality Check: Assessing GPT-4 in Fixing Real-World Software VulnerabilitiesZoltán Ságodi, Gábor Antal, Bence Bogenfürst, Martin Isztin, Péter Hegedüs, Rudolf Ferenc. 252-261 [doi]
- The Promise and Challenges of Using LLMs to Accelerate the Screening Process of Systematic ReviewsAleksi Huotala, Miikka Kuutila, Paul Ralph, Mika Mäntylä. 262-271 [doi]
- Towards Comprehending Energy Consumption of Database Management Systems - A Tool and Empirical StudyHemasri Sai Lella, Rajrupa Chattaraj, Sridhar Chimalakonda, Kurra Manasa. 272-281 [doi]
- Towards Semi-Automated Merge Conflict Resolution: Is It Easier Than We Expected?Alexander Boll, Yael Van Dok, Manuel Ohrndorf, Alexander Schultheiß, Timo Kehrer. 282-292 [doi]
- Trustworthy AI in practice: an analysis of practitioners' needs and challengesMaria Teresa Baldassarre, Domenico Gigante, Marcos Kalinowski, Azzurra Ragone, Sara Tibidò. 293-302 [doi]
- Understanding Logical Expressions with Negations: Its ComplicatedAviad Baron, Ilai Granot, Ron Yosef, Dror G. Feitelson. 303-312 [doi]
- Using Large Language Models to Generate JUnit Tests: An Empirical StudyMohammed Latif Siddiq, Joanna Cecilia sa Silva Santos, Ridwanul Hasan Tanvir, Noshin Ulfat, Fahmid Al Rifat, Vinicius Carvalho Lopes. 313-322 [doi]
- VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and LocalizationJingZheng Wu, Xiang Ling 0001, Xu Duan, Tianyue Luo, Mutian Yang. 323-332 [doi]
- A Folklore Confirmation on the Removal of Dead CodeSimone Romano 0001, Giovanni Toriello, Pietro Cassieri, Rita Francese, Giuseppe Scanniello. 333-338 [doi]
- AI-Generated Test Scripts for Web E2E Testing with ChatGPT and Copilot: A Preliminary StudyMaurizio Leotta, Hafiz Zeeshan Yousaf, Filippo Ricca, Boni García. 339-344 [doi]
- Analyzing the Accessibility of GitHub Repositories for PyPI and NPM LibrariesAlexandros Tsakpinis, Alexander Pretschner. 345-350 [doi]
- Automated categorization of pre-trained models in software engineering: A case study with a Hugging Face datasetClaudio Di Sipio, Riccardo Rubei, Juri Di Rocco, Davide Di Ruscio, Phuong T. Nguyen 0001. 351-356 [doi]
- CLAIM: a Lightweight Approach to Identify Microservices in Dockerized EnvironmentsKevin Maggi, Roberto Verdecchia, Leonardo Scommegna, Enrico Vicario. 357-362 [doi]
- Exploring Influence of Feature Toggles on Code ComplexityTajmilur Rahman, Imran Shalabi, Tushar Sharma. 363-368 [doi]
- Mining REST APIs for Potential Mass Assignment VulnerabilitiesArash Mazidi, Davide Corradini, Mohammad Ghafari. 369-374 [doi]
- On the Use of ChatGPT for Code Review: Do Developers Like Reviews By ChatGPT?Miku Watanabe, Yutaro Kashiwa, Bin Lin 0008, Toshiki Hirao, Ken'Ichi Yamaguchi, Hajimu Iida. 375-380 [doi]
- Sustainability in Blockchain Development: A BERT-Based Analysis of Ethereum Developer DiscussionsMatteo Vaccargiu, Sabrina Aufiero, Silvia Bartolucci, Rumyana Neykova, Roberto Tonelli, Giuseppe Destefanis. 381-386 [doi]
- Towards Predicting Fragility in End-to-End Web TestsSergio Di Meglio, Luigi Libero Lucio Starace. 387-392 [doi]
- Unraveling the Influences on Bug Fixing Time: A Comparative Analysis of Causal Inference ModelSien Reeve Ordonez Peralta, Hironori Washizaki, Yoshiaki Fukazawa, Yuki Noyori, Shuhei Nojiri, Hideyuki Kanuka. 393-398 [doi]
- Unveiling iOS Scamwares through Crowdturfing ReviewsZhipeng Xu, Ming Liu, Zhushou Tang, Yijun Wang. 399-404 [doi]
- What You Use is What You Get: Unforced Errors in Studying Cultural Aspects in Agile Software DevelopmentMichael Neumann, Klaus Schmid, Lars Baumann. 405-410 [doi]
- When simplicity meets effectiveness: Detecting code comments coherence with word embeddings and LSTMMichael Dubem Igbomezie, Phuong T. Nguyen 0001, Davide Di Ruscio. 411-416 [doi]
- AI-enabled efficient PVM performance monitoringMario Veniero, Davide Varriale. 417-420 [doi]
- Automated evaluation of game content display using deep learningCiprian Paduraru, Marina Cernat, Alin Stefanescu. 421-424 [doi]
- Dealing with clinical outcome and fair cost: the FIDCARE platformRaffaele Chianese, Leopoldo Beneduce, Francesco Gargiulo 0001, Stefano Marrone 0001, Laura Verde. 425-428 [doi]
- Detecting Security Fixes in Open-Source Repositories using Static Code AnalyzersTherese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri. 429-432 [doi]
- Harnessing No-Code Blockchain for DeFi: A Microcredit Case Study on AstraKode BlockchainFabiano Izzo, Damiano D'Amici. 433-436 [doi]
- Insight AI Risk Detection Model - Vulnerable People Emotional Situation SupportDiego Gosmar, Elena Peretto, Oita Coleman. 437-441 [doi]
- Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case StudyMatteo Esposito, Francesco Palagiano. 442-445 [doi]
- Negative Complement of a Set of Vulnerability-Fixing Commits: Method and DatasetRocío Cabrera Lozoya, Antonino Sabetta, Tommaso Aiello. 446-449 [doi]
- Taming App Reliability: Mobile Analytics "in the wild"Julian Harty, Arosha Bandara. 450-453 [doi]
- Automated Software Vulnerability Detection in Statement Level using Vulnerability ReportsRabaya Sultana Mim, Toukir Ahammed, Kazi Sakib. 454-455 [doi]
- Automatic detection and correction of code errors applying machine learning - current research stateAneta Poniszewska-Maranda, Wiktoria Sarniak. 456-457 [doi]
- New experimental design to capture bias using LLM to validate security threatsWinnie Bahati Mbaka. 458-459 [doi]
- A Comprehensive Framework Proposal to Design Symbiotic AI SystemsAntonio Curci. 460-465 [doi]
- Adapting to Change: Software Project Management in the Era of Security in Cloud ComputingGiusy Annunziata. 466-469 [doi]
- Agent-Driven Automatic Software ImprovementFernando Vallecillos Ruiz. 470-475 [doi]
- Assessing healthcare software built using IoT and LLM technologiesGabriele De Vito. 476-481 [doi]
- Cultural and Socio-Technical Aspects in Software DevelopmentStefano Lambiase. 482-487 [doi]
- Design and Evaluation of High-Quality Symbiotic AI Systems through a Human-Centered ApproachMiriana Calvano. 488-493 [doi]
- Human-Centered Interventions to Empower Gender Diversity in Software EngineeringClaudia Maria Cutrupi. 494-499 [doi]
- Supporting Developers' Emotional Awareness: from Self-reported Emotions to BiometricsDaniela Grassi. 500-504 [doi]
- Toward a Human-Centered Framework for Trustworthy, Safe and Ethical Generative Artificial Intelligence: A Multi-Level Analysis of Large Language Models Social ImpactBerenice Fernandez Nieto. 505-509 [doi]
- Vulnerability Detection for software-intensive systemRefat Tahseen Othman. 510-515 [doi]
- Aligning Academic with Industrial Needs: Investigating DevOpsSaima Rafi, Muhammad Azeem Akbar, Sajjad Mahmood. 516-519 [doi]
- Multivocal Literature Review on DevOps Critical Success FactorsNasreen Azad, Sami Hyrynsalmi. 520-527 [doi]
- Towards People Maturity for Secure Development and Operations: A visionMuhammad Azeem Akbar, Saima Rafi, Sami Hyrynsalmi, Arif Ali Khan. 528-533 [doi]
- Towards the successful execution of DevOps outsource software development processMuhammad Zohaib, Fahad S. Altuwaijri, Muhammad Awais. 534-537 [doi]
- Integrating Security and Privacy in Quantum Software EngineeringVita Santa Barletta, Danilo Caivano, Anibrata Pal. 538-547 [doi]
- Quantum-based Automotive Threat Intelligence and CountermeasuresVita Santa Barletta, Danilo Caivano, Christian Catalano, Mirko De Vincentiis. 548-554 [doi]
- An Empirical Study on How Large Language Models Impact Software Testing LearningSimone Mezzaro, Alessio Gambi, Gordon Fraser 0001. 555-564 [doi]
- Automatic Assessment of Architectural Anti-patterns and Code Smells in Student Software ProjectsMarco De Luca, Sergio Di Meglio, Anna Rita Fasolino, Luigi Libero Lucio Starace, Porfirio Tramontana. 565-569 [doi]
- Exploring students' opinion on software testing coursesFelix Cammaerts, Porfirio Tramontana, Ana C. R. Paiva, Nuno Flores, Fernando Pastor Ricós, Monique Snoeck. 570-579 [doi]
- Gamifying Business Process Modeling Education: A Longitudinal StudyGiacomo Garaccione, Riccardo Coppola, Luca Ardito. 580-589 [doi]
- Learning Programming without Teachers: An Ongoing Ethnographic Study at 42Nicolò Pollini, Kevin Maggi, Roberto Verdecchia, Enrico Vicario. 590-594 [doi]
- Teaching Scrum with a focus on efficiency and inclusivenessMarco Torchiano, Antonio Vetrò, Riccardo Coppola. 595-599 [doi]
- LLM Security Guard for CodeArya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari. 600-603 [doi]
- Security Risk Assessment on Cloud: A Systematic Mapping StudyGiusy Annunziata, Alexandra Sheykina, Fabio Palomba, Andrea De Lucia, Gemma Catolino, Filomena Ferrucci. 604-613 [doi]
- Semgrep*: Improving the Limited Performance of Static Application Security Testing (SAST) ToolsGareth Bennett, Tracy Hall, Emily Winter 0001, Steve Counsell. 614-623 [doi]
- Toward a Search-Based Approach to Support the Design of Security Tests for Malicious Network TrafficDavide La Gamba, Gerardo Iuliano, Gilberto Recupito, Giammaria Giordano, Filomena Ferrucci, Dario Di Nucci, Fabio Palomba. 624-628 [doi]
- 5G Secure Solution Development and Security Master RoleMuhammad Ovais Ahmad. 629-633 [doi]
- An Empirical Investigation of the Security Weaknesses in Open-Source ProjectsHaifa Al-Shammare, Nehal Al-Otaiby, Muradi Al-Otabi, Mohammad Alshayeb. 634-642 [doi]
- An LLM-based Approach to Recover Traceability Links between Security Requirements and Goal ModelsJameleddine Hassine. 643-651 [doi]
- Challenges in Developing Secure Software within Agile EnvironmentsReem Alshareef, Esra'a Alshabeeb, Noor Alakkas, Mahmood Niazi. 652-661 [doi]
- MLOps-Enabled Security Strategies for Next-Generation Operational TechnologiesTazeem Ahmad, Mohd Adnan, Saima Rafi, Muhammad Azeem Akbar, Ayesha Anwar. 662-667 [doi]
- Securing Agile: Assessing the Impact of Security Activities on Agile DevelopmentArpit Thool, Chris Brown. 668-678 [doi]
- Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPTTriet Huynh Minh Le, Muhammad Ali Babar 0001, Tung Hoang Thai. 679-685 [doi]
- Study for Integrating IoT-IDS Datasets: Machine and Deep Learning for Secure IoT Network SystemShalli Rani, Ankita Sharma, Muhammad Zohaib. 686-691 [doi]
- The Security Culture Readiness Model (SCRM) for Saudi Universities: A Preliminary StructureMona Albinali, Mahmood Niazi. 692-697 [doi]
- Triaging Microservice Security Smells, with TriSSFrancisco Ponce, Jacopo Soldani, Carla Taramasco, Hernán Astudillo, Antonio Brogi. 698-706 [doi]