首页 > 最新文献

Journal of Software-Evolution and Process最新文献

英文 中文
Merge Conflict Prediction Using Feature Selection and Stacking Heterogeneous Ensembles: An Empirical Investigation 使用特征选择和堆叠异构集成的合并冲突预测:一个实证研究
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-23 DOI: 10.1002/smr.70047
Reem Alfayez, Amal Alazba

Merge conflicts arise when multiple developers simultaneously modify the same part of a codebase and attempt to merge their changes. These conflicts occur because the version control system (VCS) cannot automatically determine which changes should take precedence. Resolving such conflicts involves manually reviewing the conflicting changes and deciding how to integrate them to maintain a functional and coherent codebase. This process is often time-consuming, complex, and prone to errors. Consequently, the software engineering community has focused on predicting merge conflicts to warn developers early and allow them to address conflicts before they escalate. Despite several efforts to predict merge conflicts, no perfect solution has been identified. Fortunately, many machine learning techniques have demonstrated potential in improving prediction performance across various contexts. This study aims to empirically investigate the effectiveness of stacking heterogeneous ensembles in enhancing merge conflict prediction performance. We empirically compared the prediction performance of the following individual models: decision trees (DT); support vector machine (SVM) with a linear kernel; naive Bayes (NB) with Bernoulli, Gaussian, and Multinomial variants; logistic regression (LR); multilayer perceptron (MLP); stochastic gradient descent (SGD); and k-nearest neighbors (KNN). Additionally, we evaluated three heterogeneous stacking ensembles: Stack-DT, Stack-SVM, and Stack-LR, which were constructed using the aforementioned individual models as base models. We utilized gain ratio (GR) to identify the most important technical and social features for predicting merge conflicts and assessed the impact of using only these important features on the performance of both individual and stacking models. The study revealed variability in the performance of individual models, with DT demonstrating the best predictive performance among them. Heterogeneous stacking ensembles demonstrated potential to enhance merge conflict prediction, with Stack-SVM emerging as the top-performing model. GR analysis highlighted the importance of both social and technical features in predicting merge conflicts. However, using only the most important features identified by GR led to a decline in the performance of most models compared to using all features. Heterogeneous stacking ensembles significantly improve prediction performance over individual models. Both social and technical features are important in predicting merge conflicts, and utilizing the full set of features instead of only the most important ones generally yields better results.

当多个开发人员同时修改代码库的同一部分并试图合并他们的更改时,就会出现合并冲突。这些冲突的发生是因为版本控制系统(VCS)不能自动确定哪些更改应该优先处理。解决这样的冲突需要手动检查冲突的变更,并决定如何集成它们以维护一个功能性和一致的代码库。这个过程通常很耗时,很复杂,而且容易出错。因此,软件工程社区关注于预测合并冲突,以便尽早警告开发人员,并允许他们在冲突升级之前解决冲突。尽管在预测合并冲突方面做出了一些努力,但还没有找到完美的解决方案。幸运的是,许多机器学习技术已经证明了在各种情况下提高预测性能的潜力。本研究旨在实证研究异构集成叠加在提高合并冲突预测性能方面的有效性。我们对以下模型的预测性能进行了实证比较:决策树(DT);线性核支持向量机;具有伯努利、高斯和多项变量的朴素贝叶斯(NB);逻辑回归;多层感知器(MLP);随机梯度下降法;和k近邻(KNN)。此外,我们评估了三种异构堆叠集成:Stack-DT, Stack-SVM和Stack-LR,它们是使用上述单个模型作为基础模型构建的。我们利用增益比(GR)来识别预测合并冲突的最重要的技术和社会特征,并评估仅使用这些重要特征对单个和堆叠模型性能的影响。该研究揭示了个体模型性能的可变性,其中DT显示出最佳的预测性能。异构堆叠集成显示出增强合并冲突预测的潜力,其中堆叠支持向量机成为表现最好的模型。GR分析强调了社会特征和技术特征在预测合并冲突中的重要性。然而,与使用所有特征相比,只使用GR识别的最重要的特征会导致大多数模型的性能下降。异质叠加集成显著提高了单个模型的预测性能。在预测合并冲突时,社会特征和技术特征都很重要,利用完整的特征集而不是只利用最重要的特征集通常会产生更好的结果。
{"title":"Merge Conflict Prediction Using Feature Selection and Stacking Heterogeneous Ensembles: An Empirical Investigation","authors":"Reem Alfayez,&nbsp;Amal Alazba","doi":"10.1002/smr.70047","DOIUrl":"https://doi.org/10.1002/smr.70047","url":null,"abstract":"<div>\u0000 \u0000 <p>Merge conflicts arise when multiple developers simultaneously modify the same part of a codebase and attempt to merge their changes. These conflicts occur because the version control system (VCS) cannot automatically determine which changes should take precedence. Resolving such conflicts involves manually reviewing the conflicting changes and deciding how to integrate them to maintain a functional and coherent codebase. This process is often time-consuming, complex, and prone to errors. Consequently, the software engineering community has focused on predicting merge conflicts to warn developers early and allow them to address conflicts before they escalate. Despite several efforts to predict merge conflicts, no perfect solution has been identified. Fortunately, many machine learning techniques have demonstrated potential in improving prediction performance across various contexts. This study aims to empirically investigate the effectiveness of stacking heterogeneous ensembles in enhancing merge conflict prediction performance. We empirically compared the prediction performance of the following individual models: decision trees (DT); support vector machine (SVM) with a linear kernel; naive Bayes (NB) with Bernoulli, Gaussian, and Multinomial variants; logistic regression (LR); multilayer perceptron (MLP); stochastic gradient descent (SGD); and k-nearest neighbors (KNN). Additionally, we evaluated three heterogeneous stacking ensembles: Stack-DT, Stack-SVM, and Stack-LR, which were constructed using the aforementioned individual models as base models. We utilized gain ratio (GR) to identify the most important technical and social features for predicting merge conflicts and assessed the impact of using only these important features on the performance of both individual and stacking models. The study revealed variability in the performance of individual models, with DT demonstrating the best predictive performance among them. Heterogeneous stacking ensembles demonstrated potential to enhance merge conflict prediction, with Stack-SVM emerging as the top-performing model. GR analysis highlighted the importance of both social and technical features in predicting merge conflicts. However, using only the most important features identified by GR led to a decline in the performance of most models compared to using all features. Heterogeneous stacking ensembles significantly improve prediction performance over individual models. Both social and technical features are important in predicting merge conflicts, and utilizing the full set of features instead of only the most important ones generally yields better results.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145172015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster Analysis of Security Threats in Web Applications: A Multiphase SDLC Analysis Web应用中安全威胁的聚类分析:多阶段SDLC分析
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-22 DOI: 10.1002/smr.70055
Shah Nawaz, Muhammad Yaseen, Gohar Rahman, Jasim Saeed

Security threats in web applications have increasingly become a major concern, particularly as modern web systems grow more complex and interconnected. Addressing these security challenges requires a comprehensive understanding of how threats are distributed across different phases of the software development life cycle (SDLC) and how various threat categories map to specific SDLC stages. Despite significant research into software security, a systematic and structured review focusing on the hierarchical relationships between SDLC phases, security threat categories, and specific threats remains scarce. This paper aims to fill this gap by conducting a clustering-based systematic review of security threats in web applications. Using data from existing literature on software security threats, we applied hierarchical clustering, K-means analysis, and co-occurrence mapping to identify relationships between SDLC phases (Level 1), security threat categories (Level 2), and specific security threats (Level 3). The findings show that the development phase presents the highest risk, more so to threats like weaknesses in architectural security design and input validation issues. Using clustering techniques, we showed how some of the threats appeared in more than one SDLC stage and classified them within the categories of threats most closely associated with the SDLC stage. Taking into account these factors, we propose recommendations for software development process stakeholders allowing for the implementation of more consistent strategies of threat mitigation through the entire SDLC. Considering these observations, it can be concluded that there is an acute deficiency in development for globalization of software security measures towards web applications to control future security threats.

web应用程序中的安全威胁日益成为人们关注的主要问题,特别是随着现代web系统变得越来越复杂和相互关联。要解决这些安全挑战,需要全面了解威胁如何分布在软件开发生命周期(SDLC)的不同阶段,以及各种威胁类别如何映射到特定的SDLC阶段。尽管对软件安全进行了重要的研究,但是关注SDLC阶段、安全威胁类别和特定威胁之间的层次关系的系统和结构化的审查仍然很少。本文旨在通过对web应用程序中的安全威胁进行基于集群的系统审查来填补这一空白。利用现有软件安全威胁文献中的数据,我们应用分层聚类、k -均值分析和共现映射来识别SDLC阶段(Level 1)、安全威胁类别(Level 2)和特定安全威胁(Level 3)之间的关系。研究结果表明,开发阶段呈现出最高的风险,尤其是像架构安全设计中的弱点和输入验证问题这样的威胁。使用聚类技术,我们展示了一些威胁如何出现在多个SDLC阶段,并将它们归类为与SDLC阶段最密切相关的威胁类别。考虑到这些因素,我们为软件开发过程利益相关者提出建议,以便在整个SDLC中实施更一致的威胁缓解战略。考虑到这些观察结果,可以得出结论,针对web应用程序的软件安全措施的全球化开发严重不足,无法控制未来的安全威胁。
{"title":"Cluster Analysis of Security Threats in Web Applications: A Multiphase SDLC Analysis","authors":"Shah Nawaz,&nbsp;Muhammad Yaseen,&nbsp;Gohar Rahman,&nbsp;Jasim Saeed","doi":"10.1002/smr.70055","DOIUrl":"https://doi.org/10.1002/smr.70055","url":null,"abstract":"<div>\u0000 \u0000 <p>Security threats in web applications have increasingly become a major concern, particularly as modern web systems grow more complex and interconnected. Addressing these security challenges requires a comprehensive understanding of how threats are distributed across different phases of the software development life cycle (SDLC) and how various threat categories map to specific SDLC stages. Despite significant research into software security, a systematic and structured review focusing on the hierarchical relationships between SDLC phases, security threat categories, and specific threats remains scarce. This paper aims to fill this gap by conducting a clustering-based systematic review of security threats in web applications. Using data from existing literature on software security threats, we applied hierarchical clustering, K-means analysis, and co-occurrence mapping to identify relationships between SDLC phases (Level 1), security threat categories (Level 2), and specific security threats (Level 3). The findings show that the development phase presents the highest risk, more so to threats like weaknesses in architectural security design and input validation issues. Using clustering techniques, we showed how some of the threats appeared in more than one SDLC stage and classified them within the categories of threats most closely associated with the SDLC stage. Taking into account these factors, we propose recommendations for software development process stakeholders allowing for the implementation of more consistent strategies of threat mitigation through the entire SDLC. Considering these observations, it can be concluded that there is an acute deficiency in development for globalization of software security measures towards web applications to control future security threats.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145111066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Data to Knowledge: Mining Linux Vulnerability Characteristics and Evolution With Knowledge Graphs 从数据到知识:利用知识图挖掘Linux漏洞特征及其演变
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-16 DOI: 10.1002/smr.70053
Shiyu Weng, Xiaoxue Wu, Tianci Li, Chen Yao, Wenjing Shan, Xiaobing Sun

An operating system is the essence of software, serving as the foundation for the operation of various application software. The security of the operating system is crucial for national informatization construction. Data indicate that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system. Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVEs) related to Linux systems reported each year. Therefore, research and prevention of vulnerabilities in the Linux system are particularly important. To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux. The study explores the evolutionary patterns of vulnerability characteristics. Specific research contents include the following: (1) data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) cross-statistical analysis of structured data features in vulnerability reports; (3) unstructured data characteristics mining in vulnerability reports based on domain knowledge; (4) analysis of the evolution of vulnerability characteristics. This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.

操作系统是软件的本质,是各种应用软件运行的基础。操作系统的安全性对国家信息化建设至关重要。数据表明,许多网络安全事件都是利用操作系统的安全漏洞造成的。Linux是目前使用最广泛的开源操作系统,每年有数千个与Linux系统相关的常见漏洞和暴露(cve)报告。因此,研究和预防Linux系统中的漏洞显得尤为重要。为了更好地了解Linux系统漏洞的特点,本文利用软件安全领域的知识,对Linux内核和Debian Linux这两个Linux核心系统的近万个历史漏洞数据进行分析。本研究探讨了脆弱性特征的演化模式。具体研究内容包括:(1)Linux Kernel和Debian Linux系统漏洞数据的收集和清理;(2)对漏洞报告中的结构化数据特征进行交叉统计分析;(3)基于领域知识的漏洞报告非结构化数据特征挖掘;(4)脆弱性特征演化分析。本文为Linux系统漏洞提供了经验教训和指导,以帮助从业者和研究人员更好地预防和检测Linux及基于Linux的系统的漏洞。
{"title":"From Data to Knowledge: Mining Linux Vulnerability Characteristics and Evolution With Knowledge Graphs","authors":"Shiyu Weng,&nbsp;Xiaoxue Wu,&nbsp;Tianci Li,&nbsp;Chen Yao,&nbsp;Wenjing Shan,&nbsp;Xiaobing Sun","doi":"10.1002/smr.70053","DOIUrl":"https://doi.org/10.1002/smr.70053","url":null,"abstract":"<div>\u0000 \u0000 <p>An operating system is the essence of software, serving as the foundation for the operation of various application software. The security of the operating system is crucial for national informatization construction. Data indicate that many cybersecurity incidents result from exploiting security vulnerabilities in the operating system. Linux is currently the most widely used open-source operating system, with thousands of Common Vulnerabilities and Exposures (CVEs) related to Linux systems reported each year. Therefore, research and prevention of vulnerabilities in the Linux system are particularly important. To gain a better understanding of the characteristics of Linux system vulnerabilities, this paper leverages knowledge in the field of software security to analyze nearly 10,000 historical vulnerability data in two core systems of Linux: Linux Kernel and Debian Linux. The study explores the evolutionary patterns of vulnerability characteristics. Specific research contents include the following: (1) data collection and cleaning of vulnerability data in Linux Kernel and Debian Linux systems; (2) cross-statistical analysis of structured data features in vulnerability reports; (3) unstructured data characteristics mining in vulnerability reports based on domain knowledge; (4) analysis of the evolution of vulnerability characteristics. This paper provides empirical lessons and guidance for Linux system vulnerabilities to assist practitioners and researchers in better preventing and detecting vulnerabilities in Linux and Linux-based systems.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145101229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UCLP: Unsupervised Classification of Key Aspects in Vulnerability Descriptions Through Label Profile UCLP:通过标签配置文件对漏洞描述中的关键方面进行无监督分类
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-13 DOI: 10.1002/smr.70052
Linyi Han, Hang Li, Xiaowang Zhang, Youmeng Li, Zhiyong Feng

Textual vulnerability descriptions (TVDs) in repositories like NVD and IBM X-Force Exchange are essential for security engineers managing vulnerabilities. Engineers typically search for key aspects in TVDs using specific phrases, but with multiple expressions for each aspect, retrieving all relevant records is challenging. We propose a label-based retrieval framework that classifies key aspects and retrieves TVDs by their broader categories. Given the large data volume, manual labeling is infeasible, making unsupervised classification critical. However, short labels and repeated words diminish semantic clarity, affecting classification accuracy. We introduce Unsupervised Classification through Label Profile (UCLP), which expands label semantics through label profiles inspired by recommendation systems. We construct profiles using neural network weights and apply TF-IDF to calculate similarities, smoothing distributions with an arctangent function. Results show that UCLP significantly outperforms four benchmarks, raising accuracy from 68.3% to 78.9% and improving three real-world applications.

像NVD和IBM X-Force Exchange这样的存储库中的文本漏洞描述(tvd)对于安全工程师管理漏洞至关重要。工程师通常使用特定的短语搜索tvd中的关键方面,但是由于每个方面都有多个表达式,因此检索所有相关记录是具有挑战性的。我们提出了一个基于标签的检索框架,该框架对关键方面进行分类,并根据其更广泛的类别检索tvd。由于数据量大,人工标注是不可行的,这使得无监督分类变得至关重要。然而,短标签和重复词降低了语义清晰度,影响了分类的准确性。我们通过标签概要介绍无监督分类(UCLP),它通过受推荐系统启发的标签概要扩展标签语义。我们使用神经网络权重构建轮廓,并应用TF-IDF计算相似度,使用arctan函数平滑分布。结果表明,UCLP显著优于四个基准,将准确率从68.3%提高到78.9%,并改善了三个实际应用。
{"title":"UCLP: Unsupervised Classification of Key Aspects in Vulnerability Descriptions Through Label Profile","authors":"Linyi Han,&nbsp;Hang Li,&nbsp;Xiaowang Zhang,&nbsp;Youmeng Li,&nbsp;Zhiyong Feng","doi":"10.1002/smr.70052","DOIUrl":"https://doi.org/10.1002/smr.70052","url":null,"abstract":"<div>\u0000 \u0000 <p>Textual vulnerability descriptions (TVDs) in repositories like NVD and IBM X-Force Exchange are essential for security engineers managing vulnerabilities. Engineers typically search for key aspects in TVDs using specific phrases, but with multiple expressions for each aspect, retrieving all relevant records is challenging. We propose a label-based retrieval framework that classifies key aspects and retrieves TVDs by their broader categories. Given the large data volume, manual labeling is infeasible, making unsupervised classification critical. However, short labels and repeated words diminish semantic clarity, affecting classification accuracy. We introduce Unsupervised Classification through Label Profile (UCLP), which expands label semantics through label profiles inspired by recommendation systems. We construct profiles using neural network weights and apply TF-IDF to calculate similarities, smoothing distributions with an arctangent function. Results show that UCLP significantly outperforms four benchmarks, raising accuracy from 68.3% to 78.9% and improving three real-world applications.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145038309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UFR-OSFA: Unified Feature Representation and Oppositional Structure Feature Alignment for Mixed-Project Heterogeneous Defect Prediction UFR-OSFA:混合项目异构缺陷预测的统一特征表示和对立结构特征对齐
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-10 DOI: 10.1002/smr.70049
Yifan Zou, Huiqiang Wang, Hongwu Lv, Shuai Zhao

Heterogeneous defect prediction (HDP) plays a crucial role in software engineering by enabling the early detection of software defects across projects with heterogeneous feature spaces. Recently, some mixed-project HDP (MP-HDP) methods have been proposed, which have demonstrated modest improvements in HDP performance. Nevertheless, existing MP-HDP approaches fail to address feature redundancy and distribution inconsistency simultaneously. To overcome these limitations, this paper proposes a novel MP-HDP approach, UFR-OSFA, based on unified feature representation and oppositional structural feature alignment. Concretely, UFR-OSFA first unifies these features by reducing the distribution differences between source and target projects through matching common features and the Hungarian algorithm based on the Kolmogorov–Smirnov (KS) test. Subsequently, utilizing a generator and two classifiers with oppositional structures, UFR-OSFA separates the features of the source project and clusters those of the target project, addressing the issue of conditional distribution mismatch and enhancing the model's generalization ability in the target project. Extensive experiments on 23 projects from five datasets demonstrate that the proposed approach performs better or comparably to baseline methods.

异质缺陷预测(HDP)在软件工程中起着至关重要的作用,它允许跨具有异质特征空间的项目早期检测软件缺陷。最近,提出了一些混合项目HDP (MP-HDP)方法,这些方法已经证明了HDP性能的适度改善。然而,现有的MP-HDP方法无法同时解决特征冗余和分布不一致的问题。为了克服这些限制,本文提出了一种新的基于统一特征表示和对置结构特征对齐的MP-HDP方法UFR-OSFA。具体来说,UFR-OSFA首先通过匹配共同特征和基于Kolmogorov-Smirnov (KS)检验的匈牙利算法,减少源项目和目标项目之间的分布差异,从而统一这些特征。随后,UFR-OSFA利用一个生成器和两个具有对立结构的分类器,对源项目的特征进行分离,对目标项目的特征进行聚类,解决了条件分布不匹配的问题,增强了模型在目标项目中的泛化能力。来自5个数据集的23个项目的广泛实验表明,所提出的方法比基线方法表现得更好或相当。
{"title":"UFR-OSFA: Unified Feature Representation and Oppositional Structure Feature Alignment for Mixed-Project Heterogeneous Defect Prediction","authors":"Yifan Zou,&nbsp;Huiqiang Wang,&nbsp;Hongwu Lv,&nbsp;Shuai Zhao","doi":"10.1002/smr.70049","DOIUrl":"https://doi.org/10.1002/smr.70049","url":null,"abstract":"<div>\u0000 \u0000 <p>Heterogeneous defect prediction (HDP) plays a crucial role in software engineering by enabling the early detection of software defects across projects with heterogeneous feature spaces. Recently, some mixed-project HDP (MP-HDP) methods have been proposed, which have demonstrated modest improvements in HDP performance. Nevertheless, existing MP-HDP approaches fail to address feature redundancy and distribution inconsistency simultaneously. To overcome these limitations, this paper proposes a novel MP-HDP approach, UFR-OSFA, based on unified feature representation and oppositional structural feature alignment. Concretely, UFR-OSFA first unifies these features by reducing the distribution differences between source and target projects through matching common features and the Hungarian algorithm based on the Kolmogorov–Smirnov (KS) test. Subsequently, utilizing a generator and two classifiers with oppositional structures, UFR-OSFA separates the features of the source project and clusters those of the target project, addressing the issue of conditional distribution mismatch and enhancing the model's generalization ability in the target project. Extensive experiments on 23 projects from five datasets demonstrate that the proposed approach performs better or comparably to baseline methods.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145037623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CyberESP: An Integrated Cybersecurity Framework for SMEs CyberESP:中小企业综合网络安全框架
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-09 DOI: 10.1002/smr.70050
Jose A. Calvo-Manzano, Tomás San Feliu, Ángel Herranz, Julio Mariño, Lars-Åke Fredlund, Ana M. Moreno

Cybersecurity is a critical global concern, particularly for small- and medium-sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi-automated tool to ensure Spanish SMEs' cybersecurity management. Following the Design Science Research (DSR) methodology and grounded in international standards, the authors identified six requirements to be satisfied by a cybersecurity framework for SMEs, which should support the identification of assets, vulnerabilities, threats, and risks. This paper presents the first part of the CyberESP framework dealing with asset management, particularly their identification and analysis of dimensions and cost. A prototype supporting these activities was developed and validated through a case study in a retail SME, showing the solution's potential and identifying particular improvements. The paper also addresses threats to validity and limitations, noting the framework's focus on hardware, software, and networks. Future work includes vulnerability management and will explore the use of cloud and IoT deployment, positioning CyberESP as a practical solution to enhance SMEs' cybersecurity resilience.

网络安全是一个重要的全球问题,特别是对于资源和专业知识有限的中小型企业(SMEs)。作者正在开发CyberESP,这是一种定制的网络安全框架,由半自动工具支持,以确保西班牙中小企业的网络安全管理。遵循设计科学研究(DSR)方法并以国际标准为基础,作者确定了中小企业网络安全框架需要满足的六个要求,该框架应支持资产、漏洞、威胁和风险的识别。本文介绍了处理资产管理的CyberESP框架的第一部分,特别是对维度和成本的识别和分析。通过一个零售中小企业的案例研究,开发并验证了支持这些活动的原型,展示了解决方案的潜力并确定了特定的改进。本文还讨论了有效性和局限性的威胁,注意到框架的重点是硬件、软件和网络。未来的工作包括漏洞管理,并将探索使用云和物联网部署,将CyberESP定位为增强中小企业网络安全弹性的实用解决方案。
{"title":"CyberESP: An Integrated Cybersecurity Framework for SMEs","authors":"Jose A. Calvo-Manzano,&nbsp;Tomás San Feliu,&nbsp;Ángel Herranz,&nbsp;Julio Mariño,&nbsp;Lars-Åke Fredlund,&nbsp;Ana M. Moreno","doi":"10.1002/smr.70050","DOIUrl":"https://doi.org/10.1002/smr.70050","url":null,"abstract":"<p>Cybersecurity is a critical global concern, particularly for small- and medium-sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi-automated tool to ensure Spanish SMEs' cybersecurity management. Following the Design Science Research (DSR) methodology and grounded in international standards, the authors identified six requirements to be satisfied by a cybersecurity framework for SMEs, which should support the identification of assets, vulnerabilities, threats, and risks. This paper presents the first part of the CyberESP framework dealing with asset management, particularly their identification and analysis of dimensions and cost. A prototype supporting these activities was developed and validated through a case study in a retail SME, showing the solution's potential and identifying particular improvements. The paper also addresses threats to validity and limitations, noting the framework's focus on hardware, software, and networks. Future work includes vulnerability management and will explore the use of cloud and IoT deployment, positioning CyberESP as a practical solution to enhance SMEs' cybersecurity resilience.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145022283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Engineering MLOps Pipelines With Data Quality: A Case Study on Tabular Datasets in Kaggle 具有数据质量的工程MLOps管道:Kaggle中表格数据集的案例研究
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-08 DOI: 10.1002/smr.70044
Matteo Pancini, Matteo Camilli, Giovanni Quattrocchi, Damian Andrew Tamburri

Ensuring high-quality data is crucial for the successful deployment of machine learning models, thereby sustaining the operational pipelines around such models. However, a significant number of practitioners do not currently use data quality checks or measurements as gateways for their model construction and operationalization, indicating a need for greater awareness and adoption of these tools. In this study, we propose an automated approach for automating the process of architecting machine learning pipelines by means of (semi-)automated data quality checks. We focus on tabular data as a representative of the most widely used structured data formats in said pipelines. Our work is based on a subset of metrics that are particularly relevant in MLOps pipelines, stemming from our engagement with expert practitioners in machine learning operations (MLOps). We selected Deepchecks, a well-known tool for conducting data quality checks, from a cohort of similar tools to evaluate the quality of datasets collected from Kaggle, a widely used platform for machine learning competitions and data science projects. We also analyze the main features used by Kaggle to rank their datasets and used these features to validate the relevance of our approach. Our approach shows the potential for automated data quality checks to improve the efficiency and effectiveness of MLOps pipelines and their operation, by decreasing the risk of introducing errors and biases into machine learning models in production.

确保高质量的数据对于成功部署机器学习模型至关重要,从而维持围绕这些模型的操作管道。然而,相当数量的从业者目前没有使用数据质量检查或测量作为模型构建和操作化的网关,这表明需要更多地了解和采用这些工具。在这项研究中,我们提出了一种自动化的方法,通过(半)自动化的数据质量检查来自动化构建机器学习管道的过程。我们关注表格数据,将其作为上述管道中最广泛使用的结构化数据格式的代表。我们的工作是基于MLOps管道中特别相关的指标子集,这源于我们与机器学习操作(MLOps)的专家从业人员的合作。我们从一系列类似的工具中选择了Deepchecks,这是一个著名的数据质量检查工具,用于评估从Kaggle收集的数据集的质量,Kaggle是一个广泛用于机器学习竞赛和数据科学项目的平台。我们还分析了Kaggle用来对数据集进行排序的主要特征,并使用这些特征来验证我们方法的相关性。我们的方法显示了自动化数据质量检查的潜力,通过降低在生产中引入错误和偏差的机器学习模型的风险,可以提高MLOps管道及其操作的效率和有效性。
{"title":"Engineering MLOps Pipelines With Data Quality: A Case Study on Tabular Datasets in Kaggle","authors":"Matteo Pancini,&nbsp;Matteo Camilli,&nbsp;Giovanni Quattrocchi,&nbsp;Damian Andrew Tamburri","doi":"10.1002/smr.70044","DOIUrl":"https://doi.org/10.1002/smr.70044","url":null,"abstract":"<p>Ensuring high-quality data is crucial for the successful deployment of machine learning models, thereby sustaining the operational pipelines around such models. However, a significant number of practitioners do not currently use data quality checks or measurements as gateways for their model construction and operationalization, indicating a need for greater awareness and adoption of these tools. In this study, we propose an automated approach for automating the process of architecting machine learning pipelines by means of (semi-)automated data quality checks. We focus on tabular data as a representative of the most widely used structured data formats in said pipelines. Our work is based on a subset of metrics that are particularly relevant in MLOps pipelines, stemming from our engagement with expert practitioners in machine learning operations (MLOps). We selected Deepchecks, a well-known tool for conducting data quality checks, from a cohort of similar tools to evaluate the quality of datasets collected from Kaggle, a widely used platform for machine learning competitions and data science projects. We also analyze the main features used by Kaggle to rank their datasets and used these features to validate the relevance of our approach. Our approach shows the potential for automated data quality checks to improve the efficiency and effectiveness of MLOps pipelines and their operation, by decreasing the risk of introducing errors and biases into machine learning models in production.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Multi-Class Socio-Technical Congruence: Assessing Coordination in Collaborative Software Development Settings 迈向多阶层社会技术一致性:协同软件开发环境下的协调评估
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-08 DOI: 10.1002/smr.70040
Roshan Namal Rajapakse, Claudia Szabo

Effective coordination between contributors with different functional roles is fundamental for the success of collaboration-centric software development paradigms such as DevSecOps. However, quantitatively assessing coordination in such settings has received limited attention. We introduce multi-class socio-technical congruence (MC-STC$$ MChbox{-} STC $$), an extension of the widely studied socio-technical congruence (STC$$ STC $$) framework to address this gap. Our metric enables the assessment of coordination in a setting where contributors with different functional roles or alignments collaborate. Using a large-scale exploratory case study, we evaluated MC-STC$$ MChbox{-} STC $$ for two classes (i.e., 2C-STC$$ 2Chbox{-} STC $$). Specifically, we calculated 2C-STC$$ 2Chbox{-} STC $$ for 100 systematically selected projects from the TravisTorrent dataset, considering developers (dev) and security-focused developers (sf-devs) as the two types of contributors with different functional alignments (i.e., two classes). We hypothesized that the dev and sf-dev interaction would have a quantifiable impact on the vulnerability score (

具有不同功能角色的贡献者之间的有效协调是以协作为中心的软件开发范例(如DevSecOps)成功的基础。但是,对这种情况下的协调进行定量评估的注意有限。我们引入了多阶层的社会技术一致性(M C - S T C) $$ MChbox{-} STC $$ ),是广泛研究的社会技术一致性的延伸 $$ STC $$ )框架来解决这一差距。我们的度量允许在具有不同功能角色或联盟的贡献者协作的环境中评估协调。通过大规模的探索性案例研究,我们评估了C - S - T - C $$ MChbox{-} STC $$ 为两类(即2c - S - T - C) $$ 2Chbox{-} STC $$ ). 具体来说,我们计算了2c - stc $$ 2Chbox{-} STC $$ 从TravisTorrent数据集中系统地选择100个项目,考虑开发人员(dev)和以安全为重点的开发人员(sf-devs)作为两种类型的贡献者,具有不同的功能定位(即两个类)。我们假设开发人员和自开发人员之间的交互会对漏洞评分(vs)产生可量化的影响 $$ VS $$ )。我们的结果表明,2c - S - T - C之间存在适度的负相关 $$ 2Chbox{-} STC $$ 和V S $$ VS $$ , Spearman相关达到− $$ - $$ 0.427 (p = 0。00000624 $$ p=0.00000624 $$ ),这表明开发人员和软件开发人员之间更高层次的协调导致了高严重性漏洞发生率较低的项目。另外,2 C - S - T - C $$ 2Chbox{-} STC $$ 与vs呈较强的负相关 $$ VS $$ 比S T C $$ STC $$ 这表明它是这种关系的更敏感的指标。因此,我们提出的度量的具体实例,2c - S - T - C $$ 2Chbox{-} STC $$ 的表现相对较好 $$ STC $$ 用于衡量我们选定项目中的跨职能协调。然而,进一步的研究需要探索其更广泛的适用性。
{"title":"Towards Multi-Class Socio-Technical Congruence: Assessing Coordination in Collaborative Software Development Settings","authors":"Roshan Namal Rajapakse,&nbsp;Claudia Szabo","doi":"10.1002/smr.70040","DOIUrl":"https://doi.org/10.1002/smr.70040","url":null,"abstract":"<p>Effective coordination between contributors with different functional roles is fundamental for the success of collaboration-centric software development paradigms such as DevSecOps. However, quantitatively assessing coordination in such settings has received limited attention. We introduce multi-class socio-technical congruence (<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>M</mi>\u0000 <mi>C</mi>\u0000 <mtext>-</mtext>\u0000 <mi>S</mi>\u0000 <mi>T</mi>\u0000 <mi>C</mi>\u0000 </mrow>\u0000 <annotation>$$ MChbox{-} STC $$</annotation>\u0000 </semantics></math>), an extension of the widely studied socio-technical congruence (<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>S</mi>\u0000 <mi>T</mi>\u0000 <mi>C</mi>\u0000 </mrow>\u0000 <annotation>$$ STC $$</annotation>\u0000 </semantics></math>) framework to address this gap. Our metric enables the assessment of coordination in a setting where contributors with different functional roles or alignments collaborate. Using a large-scale exploratory case study, we evaluated <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>M</mi>\u0000 <mi>C</mi>\u0000 <mtext>-</mtext>\u0000 <mi>S</mi>\u0000 <mi>T</mi>\u0000 <mi>C</mi>\u0000 </mrow>\u0000 <annotation>$$ MChbox{-} STC $$</annotation>\u0000 </semantics></math> for two classes (i.e., <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>2</mn>\u0000 <mi>C</mi>\u0000 <mtext>-</mtext>\u0000 <mi>S</mi>\u0000 <mi>T</mi>\u0000 <mi>C</mi>\u0000 </mrow>\u0000 <annotation>$$ 2Chbox{-} STC $$</annotation>\u0000 </semantics></math>). Specifically, we calculated <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>2</mn>\u0000 <mi>C</mi>\u0000 <mtext>-</mtext>\u0000 <mi>S</mi>\u0000 <mi>T</mi>\u0000 <mi>C</mi>\u0000 </mrow>\u0000 <annotation>$$ 2Chbox{-} STC $$</annotation>\u0000 </semantics></math> for 100 systematically selected projects from the <i>TravisTorrent</i> dataset, considering developers (<i>dev</i>) and security-focused developers (<i>sf-devs</i>) as the two types of contributors with different functional alignments (i.e., two classes). We hypothesized that the <i>dev</i> and <i>sf-dev</i> interaction would have a quantifiable impact on the <i>vulnerability score</i> (<span></span><math>\u0000 <semantics>\u0000 <mrow","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145012977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritization Method for Crowdsourced Test Report by Integrating Text and Image Information 基于文本和图像信息集成的众包测试报告排序方法
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-04 DOI: 10.1002/smr.70043
Huijie Tu, Xiangjuan Yao, Dunwei Gong, Yan Yang

Crowdsourcing testing has the advantages of efficiency, speed, and reliability, but an excessive number of test reports makes it a challenge for report reviewers to select high-quality test reports in a limited time. Test reports submitted by crowd workers often tend to be short textual descriptions with a large number of screenshots attached. Most traditional processing methods of test reports target reports that only contain text information, which cannot meet the defect detection requirements of crowdsourced test reports. In view of this, this paper proposes a prioritization method of crowdsourced test reports that integrates text and image information. First, we extract the text and image information from the test reports, based on which the defect detection abilities of the test reports are measured and the similarities between test reports are calculated. Then, a multi-stage prioritization method of the test reports is presented based on the defect detection levels and similarities of the test reports. In the first stage, based on the defect detection levels and the similarities, the test report set is sorted and clustered to obtain the sorting results of partial reports and the similar set for each sorted report; in the second stage, the similar test report set is sorted with the criteria of minimizing the similarity and maximizing the defect detection level; the sorting results of the two stages are combined to form the final priorities of test reports. To validate our approach, we conducted experiments on five crowdsourced test datasets. The results and the analysis show that our approach can detect all faults faster in a limited time. By comprehensively utilizing text and image information to prioritize test reports, better sorting results can be obtained than state-of-the-art methods.

众包测试具有效率、速度和可靠性的优点,但是过多的测试报告使得报告审阅者很难在有限的时间内选择出高质量的测试报告。众工提交的测试报告往往是简短的文字描述,并附上大量的截图。传统的测试报告处理方法大多针对仅包含文本信息的报告,无法满足众包测试报告的缺陷检测需求。鉴于此,本文提出了一种融合文本和图像信息的众包测试报告排序方法。首先,我们从测试报告中提取文本和图像信息,在此基础上度量测试报告的缺陷检测能力并计算测试报告之间的相似度。然后,基于测试报告的缺陷检测等级和相似度,提出了测试报告的多阶段优先排序方法。第一阶段,根据缺陷检测等级和相似度,对测试报告集进行排序和聚类,得到部分报告的排序结果和每个排序报告的相似度集;第二阶段,以相似性最小化和缺陷检测等级最大化为准则对相似测试报告集进行排序;将两个阶段的排序结果结合起来,形成最终的测试报告优先级。为了验证我们的方法,我们在五个众包测试数据集上进行了实验。结果和分析表明,该方法可以在有限的时间内更快地检测出所有故障。通过综合利用文本和图像信息对测试报告进行排序,可以获得比现有方法更好的排序结果。
{"title":"Prioritization Method for Crowdsourced Test Report by Integrating Text and Image Information","authors":"Huijie Tu,&nbsp;Xiangjuan Yao,&nbsp;Dunwei Gong,&nbsp;Yan Yang","doi":"10.1002/smr.70043","DOIUrl":"https://doi.org/10.1002/smr.70043","url":null,"abstract":"<div>\u0000 \u0000 <p>Crowdsourcing testing has the advantages of efficiency, speed, and reliability, but an excessive number of test reports makes it a challenge for report reviewers to select high-quality test reports in a limited time. Test reports submitted by crowd workers often tend to be short textual descriptions with a large number of screenshots attached. Most traditional processing methods of test reports target reports that only contain text information, which cannot meet the defect detection requirements of crowdsourced test reports. In view of this, this paper proposes a prioritization method of crowdsourced test reports that integrates text and image information. First, we extract the text and image information from the test reports, based on which the defect detection abilities of the test reports are measured and the similarities between test reports are calculated. Then, a multi-stage prioritization method of the test reports is presented based on the defect detection levels and similarities of the test reports. In the first stage, based on the defect detection levels and the similarities, the test report set is sorted and clustered to obtain the sorting results of partial reports and the similar set for each sorted report; in the second stage, the similar test report set is sorted with the criteria of minimizing the similarity and maximizing the defect detection level; the sorting results of the two stages are combined to form the final priorities of test reports. To validate our approach, we conducted experiments on five crowdsourced test datasets. The results and the analysis show that our approach can detect all faults faster in a limited time. By comprehensively utilizing text and image information to prioritize test reports, better sorting results can be obtained than state-of-the-art methods.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144934867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Software Engineering Research for Systems-of-Systems and Software Ecosystems 系统的系统和软件生态系统的软件工程研究进展
IF 1.8 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-09-04 DOI: 10.1002/smr.70046
Rodrigo Santos, Antonia Bertolino, Pablo Antonino, Doo-Hwan Bae

For more than a decade, software engineering for systems-of-systems (SoS) and software ecosystems (SECO) has been largely investigated in order to cope with complexity in software-intensive systems. SoS research addresses several aspects related to software system architecture comprising a set of constituent systems that relate to each other to perform missions. As such, SoS have key characteristics such as operational and managerial independence, distribution, emergent behavior, and evolutionary development. Full interoperability and dynamic architecture become critical challenges in this context. On the hand, SECO research refers to modeling and analysis of a socio-technical network of actors and artifacts formed on top of common technological platforms, in which business factors directly influence software maintenance and evolution. Software sustainability and diversity as well as quality attributes that affect the SECO platform health represent challenges in the field. From the long-running, successful series of the International Workshop on Software Engineering for systems-of-systems and Software Ecosystems (SESoS), co-located with the IEEE/ACM International Conference on Software Engineering (ICSE), we present this special issue on the topics in the Journal of Software: Evolution and Process from SESoS 2023 in Melbourne, Australia. Four articles were accepted and published in this special issue, covering a longitudinal analysis of SoS research, as well as strategic patterns, services, and trust in SECO. These articles provide researchers and practitioners with advances in the state of the art and point out opportunities for further research.

十多年来,为了应对软件密集型系统的复杂性,对系统的系统(SoS)和软件生态系统(SECO)的软件工程进行了大量的研究。SoS研究涉及与软件系统架构相关的几个方面,该架构由一组相互关联以执行任务的组成系统组成。因此,SoS具有运营和管理独立性、分布、紧急行为和进化发展等关键特征。在这种情况下,完全互操作性和动态体系结构成为关键的挑战。另一方面,SECO研究是指在公共技术平台之上形成的参与者和工件的社会技术网络的建模和分析,其中业务因素直接影响软件的维护和发展。影响SECO平台健康的软件可持续性和多样性以及质量属性是该领域的挑战。在与IEEE/ACM软件工程国际会议(ICSE)共同举办的系统的系统和软件生态系统(SESoS)国际软件工程研讨会(SESoS)的长期成功的系列会议中,我们在澳大利亚墨尔本的《软件杂志:SESoS 2023的进化和过程》中提出了这一专题。四篇文章在本期特刊中被接受并发表,内容包括对SoS研究的纵向分析,以及对SECO的战略模式、服务和信任。这些文章为研究人员和实践者提供了最新的技术进展,并指出了进一步研究的机会。
{"title":"Advances in Software Engineering Research for Systems-of-Systems and Software Ecosystems","authors":"Rodrigo Santos,&nbsp;Antonia Bertolino,&nbsp;Pablo Antonino,&nbsp;Doo-Hwan Bae","doi":"10.1002/smr.70046","DOIUrl":"https://doi.org/10.1002/smr.70046","url":null,"abstract":"<p>For more than a decade, software engineering for systems-of-systems (SoS) and software ecosystems (SECO) has been largely investigated in order to cope with complexity in software-intensive systems. SoS research addresses several aspects related to software system architecture comprising a set of constituent systems that relate to each other to perform missions. As such, SoS have key characteristics such as operational and managerial independence, distribution, emergent behavior, and evolutionary development. Full interoperability and dynamic architecture become critical challenges in this context. On the hand, SECO research refers to modeling and analysis of a socio-technical network of actors and artifacts formed on top of common technological platforms, in which business factors directly influence software maintenance and evolution. Software sustainability and diversity as well as quality attributes that affect the SECO platform health represent challenges in the field. From the long-running, successful series of the International Workshop on Software Engineering for systems-of-systems and Software Ecosystems (SESoS), co-located with the IEEE/ACM International Conference on Software Engineering (ICSE), we present this special issue on the topics in the Journal of Software: Evolution and Process from SESoS 2023 in Melbourne, Australia. Four articles were accepted and published in this special issue, covering a longitudinal analysis of SoS research, as well as strategic patterns, services, and trust in SECO. These articles provide researchers and practitioners with advances in the state of the art and point out opportunities for further research.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 9","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144935249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Software-Evolution and Process
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1