Digitala Vetenskapliga Arkivet

Change search
Link to record
Permanent link

Direct link
Publications (10 of 44) Show all publications
Novikov, O., Fucci, D., Adamov, O. & Mendez, D. (2026). Policy-Driven Software Bill of Materials on GitHub: An Empirical Study. In: Scanniello G., Romano S., Francese R., Lenarduzzi V., Vegas S. (Ed.), Product-Focused Software Process Improvement: 26th International Conference, PROFES 2025, Salerno, Italy, December 1–3, 2025, Proceedings. Paper presented at 26th International Conference on Product-Focused Software Process Improvement, PROFES 2025, Salerno, Dec 1-3, 2025 (pp. 253-268).
Open this publication in new window or tab >>Policy-Driven Software Bill of Materials on GitHub: An Empirical Study
2026 (English)In: Product-Focused Software Process Improvement: 26th International Conference, PROFES 2025, Salerno, Italy, December 1–3, 2025, Proceedings / [ed] Scanniello G., Romano S., Francese R., Lenarduzzi V., Vegas S., 2026, p. 253-268Conference paper, Published paper (Refereed)
Abstract [en]

Background. The Software Bill of Materials (SBOM) is a machine-readable list of all the software dependencies included in a software. SBOM emerged as way to assist securing the software supply chain. However, despite mandates from governments to use SBOM, research on this artifact is still in its early stages.

Aims. We want to understand the current state of SBOM in open-source projects, focusing specifically on policy-driven SBOMs—i.e., SBOM created to achieve security goals, such as enhancing project transparency and ensuring compliance, rather than being used as fixtures for tools or artificially generated for benchmarking or academic research purposes.

Method. We performed a mining software repository study to collect and carefully select 620 SBOM files hosted on GitHub. We analyzed the information reported in policy-driven SBOMs and the vulnerabilities associated with the declared dependencies by means of descriptive statistics.

Results. We show that only 0.56% of popular GitHub repositories contain policy-driven SBOM. The declared dependencies contain 2,202 unique vulnerabilities, while 22% of them do not report licensing information.

Conclusion. Our findings provide insights for SBOM usage to support security assessment and licensing. 

Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 16361
Keywords
dependencies, open-source, SBOM, software security, Supply chain attacks, vulnerabilities, Network security, Open systems, Supply chains, Bill of materials, Dependency, Empirical studies, Policy driven, Software bill of material, Software dependencies, Supply chain attack, Vulnerability, Open source software
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28990 (URN)10.1007/978-3-032-12089-2_16 (DOI)2-s2.0-105023309206 (Scopus ID)9783032120885 (ISBN)
Conference
26th International Conference on Product-Focused Software Process Improvement, PROFES 2025, Salerno, Dec 1-3, 2025
Funder
Knowledge Foundation, 20180010
Available from: 2025-12-12 Created: 2025-12-12 Last updated: 2025-12-12Bibliographically approved
Kosenkov, O., Zabardast, E., Fucci, D., Mendez, D. & Unterkalmsteiner, M. (2026). Privacy by design: Aligning GDPR and software engineering specifications with a requirements engineering approach. Information and Software Technology, 190, Article ID 107946.
Open this publication in new window or tab >>Privacy by design: Aligning GDPR and software engineering specifications with a requirements engineering approach
Show others...
2026 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 190, article id 107946Article in journal (Refereed) Published
Abstract [en]

Context: Consistent requirements and system specifications are essential for the compliance of software systems towards the General Data Protection Regulation (GDPR). Both artefacts need to be "grounded" in the original text and conjointly assure the achievement of privacy by design (PbD). Objectives: There is little understanding of the perspectives of practitioners on specification objectives and goals to address PbD. Existing approaches to GDPR and PbD do not account for the complex intersection between problem and solution space expressed in GDPR. In this study we explore the demand for conjoint requirements and system specification for PbD and suggest an initial version of an approach to address this demand. Methods: We reviewed existing secondary and related primary studies on GDPR compliance and conducted interviews with practitioners to (1) investigate the state-of-practice in requirements and system specifications for GDPR compliance and (2) understand the underlying specification objectives and goals (e.g., traceability). We developed and evaluated an initial version of an approach for requirements and systems specification for PbD, and evaluated it against the specification objectives. Results: The relationship between problem and solution space, as expressed in GDPR, is instrumental in supporting PbD. We demonstrate how our approach, based on the modeling GDPR content with original legal concepts, contributes to specification objectives of capturing legal knowledge, supporting specification transparency for roles involved, and traceability. Conclusion: In addition to assuring traceability, GDPR demands need to be addressed throughout different levels of abstraction in the engineering lifecycle to achieve PbD. Legal knowledge specified in the GDPR text should be captured in specifications to address the demands of different stakeholders and ensure compliance. While our results confirm the suitability of our approach to address practical needs, we also revealed specific needs for the future effective operationalization of our suggested approach.

Place, publisher, year, edition, pages
Elsevier, 2026
Keywords
Regulatory requirements engineering, Software architecture, Privacy by design, Privacy engineering, Empirical software engineering
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28951 (URN)10.1016/j.infsof.2025.107946 (DOI)001616037200001 ()
Available from: 2025-12-01 Created: 2025-12-01 Last updated: 2025-12-01Bibliographically approved
Frattini, J., Fucci, D., Torkar, R., Montgomery, L., Unterkalmsteiner, M., Fischbach, J. & Mendez, D. (2025). Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment. Empirical Software Engineering, 30(1), Article ID 29.
Open this publication in new window or tab >>Applying bayesian data analysis for causal inference about requirements quality: a controlled experiment
Show others...
2025 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 30, no 1, article id 29Article in journal (Refereed) Published
Abstract [en]

It is commonly accepted that the quality of requirements specifications impacts subsequent software engineering activities. However, we still lack empirical evidence to support organizations in deciding whether their requirements are good enough or impede subsequent activities. We aim to contribute empirical evidence to the effect that requirements quality defects have on a software engineering activity that depends on this requirement. We conduct a controlled experiment in which 25 participants from industry and university generate domain models from four natural language requirements containing different quality defects. We evaluate the resulting models using both frequentist and Bayesian data analysis. Contrary to our expectations, our results show that the use of passive voice only has a minor impact on the resulting domain models. The use of ambiguous pronouns, however, shows a strong effect on various properties of the resulting domain models. Most notably, ambiguous pronouns lead to incorrect associations in domain models. Despite being equally advised against by literature and frequentist methods, the Bayesian data analysis shows that the two investigated quality defects have vastly different impacts on software engineering activities and, hence, deserve different levels of attention. Our employed method can be further utilized by researchers to improve reliable, detailed empirical evidence on requirements quality. © The Author(s) 2024.

Place, publisher, year, edition, pages
Springer, 2025
Keywords
Bayesian data analysis, Experiment, Replication, Requirements engineering, Requirements quality, Data accuracy, Data assimilation, Data consistency, Spatio-temporal data, Causal inferences, Controlled experiment, Domain model, Engineering activities, Quality defects, Requirement engineering, Requirement quality, Requirements specifications, Software quality
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27175 (URN)10.1007/s10664-024-10582-1 (DOI)001361224300001 ()2-s2.0-85209711862 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2026-01-05Bibliographically approved
Fucci, D., Di Penta, M., Romano, S. & Scanniello, G. (2025). Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub. In: Li, J (Ed.), FSE Companion '25: Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering. Paper presented at 33rd ACM International Conference on the Foundations of Software Engineering, FSE Companion 2025, Trondheim, June 23-27, 2025 (pp. 631-635). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub
2025 (English)In: FSE Companion '25: Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering / [ed] Li, J, Association for Computing Machinery (ACM), 2025, p. 631-635Conference paper, Published paper (Refereed)
Abstract [en]

Software Bills of Material (SBOMs) are becoming a consolidated-and often enforced by governmental regulations-way to describe software composition. However, based on recent studies, SBOMs suffer from limited support for their consumption and lack information beyond simple dependencies, especially regarding software vulnerabilities. This paper reports the results of a preliminary study in which we augmented SBOMs of 40 open-source projects with information about Common Vulnerabilities and Exposures (CVE) exposed by project dependencies. Our augmented SBOMs have been evaluated by submitting pull requests and by asking project owners to answer a survey. Although, in most cases, augmented SBOMs were not directly accepted because owners required a continuous SBOM update, the received feedback shows the usefulness of the suggested SBOM augmentation.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
SBOM, Software repositories, VEX, Vulnerabilities management
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-28600 (URN)10.1145/3696630.3728513 (DOI)001593214400070 ()2-s2.0-105013970463 (Scopus ID)9798400712760 (ISBN)
Conference
33rd ACM International Conference on the Foundations of Software Engineering, FSE Companion 2025, Trondheim, June 23-27, 2025
Funder
Knowledge Foundation, 20230087Knowledge Foundation, 20180010
Available from: 2025-09-05 Created: 2025-09-05 Last updated: 2025-12-15Bibliographically approved
Frattini, J., Unterkalmsteiner, M., Fucci, D. & Mendez, D. (2025). NLP4RE Tools: Classification, Overview and Management. In: Alessio Ferrari, Gouri Ginde (Ed.), Handbook on Natural Language Processing for Requirements Engineering: (pp. 357-380). Springer Nature
Open this publication in new window or tab >>NLP4RE Tools: Classification, Overview and Management
2025 (English)In: Handbook on Natural Language Processing for Requirements Engineering / [ed] Alessio Ferrari, Gouri Ginde, Springer Nature, 2025, p. 357-380Chapter in book (Other academic)
Abstract [en]

Tools constitute an essential contribution to natural language processing for requirements engineering (NLP4RE) research. They are executable instruments that make research usable and applicable in practice. In this chapter, we first introduce a systematic classification of NLP4RE tools. Then, we extend an existing overview with a systematic summary of 126 NLP4RE tools published between April 2019 and June 2023. Finally, we provide instructions on how to create, maintain and disseminate NLP4RE tools. The content of this chapter contributes (1) a classification scheme to improve the understanding of their types and properties, (2) a systematic overview to ease the reuse and evolution of existing tools and (3) guidelines to support a more rigorous management and dissemination. 

Place, publisher, year, edition, pages
Springer Nature, 2025
Keywords
Natural language processing, Open science, Requirements engineering, Tool, Engineering research, Industrial research, Classification scheme, Executables, Language processing, Natural languages, Property, Requirement engineering, Reuse
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27881 (URN)10.1007/978-3-031-73143-3_13 (DOI)2-s2.0-105004614312 (Scopus ID)9783031731433 (ISBN)9783031731426 (ISBN)
Available from: 2025-05-23 Created: 2025-05-23 Last updated: 2025-09-30Bibliographically approved
Uyaguari, F., Acuña, S. T., Castro, J. W., Fucci, D., Dieste, O. & Vegas, S. (2025). Relevant Information in TDD Experiment Reporting. ACM Transactions on Software Engineering and Methodology, 34(2), Article ID 28.
Open this publication in new window or tab >>Relevant Information in TDD Experiment Reporting
Show others...
2025 (English)In: ACM Transactions on Software Engineering and Methodology, ISSN 1049-331X, E-ISSN 1557-7392, Vol. 34, no 2, article id 28Article in journal (Refereed) Published
Abstract [en]

Experiments are a commonly used method of research in software engineering (SE). Researchers report their experiments following detailed guidelines. However, researchers do not, in the field of test-driven development (TDD) at least, specify how they operationalized the response variables and, particularly, the measurement process. This article has three aims: (i) identify the response variable operationalization components in TDD experiments that study external quality; (ii) study their influence on the experimental results; (iii) determine if the experiment reports describe the measurement process components that have an impact on the results. We used two-part sequential mixed methods research. The first part of the research adopts a quantitative approach applying a statistical analysis of the impact of the operationalization components on the experimental results. The second part follows with a qualitative approach applying a systematic mapping study (SMS). The test suites, intervention types and measurers have an influence on the measurements and results of the statistical analysis of TDD experiments in SE. The test suites have a major impact on both the measurements and the results of the experiments. The intervention type has less impact on the results than on the measurements. While the measurers have an impact on the measurements, this is not transferred to the experimental results. On the other hand, the results of our SMS confirm that TDD experiments do not usually report either the test suites, the test case generation method, or the details of how external quality was measured. A measurement protocol should be used to ensure that the measurements made by different measurers are similar. It is necessary to report the test cases, the experimental task and the intervention type in order to be able to reproduce the measurements and statistical analyses, as well as to replicate experiments and build dependable families of experiments. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
code intervention, experiment, experimental task, measurement, measurer, missing information, operationalization, SMS, systematic mapping study, TDD, test cases, test-driven development, Strain measurement, Text messaging, Measure, Systematic mapping studies, Test case, Test driven development, Mapping
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27494 (URN)10.1145/3688837 (DOI)001431090600003 ()2-s2.0-85218096347 (Scopus ID)
Funder
European Regional Development Fund (ERDF), PID2021-122270OB- I00
Available from: 2025-03-03 Created: 2025-03-03 Last updated: 2025-09-30Bibliographically approved
Kosenkov, O., Elahidoost, P., Gorschek, T., Fischbach, J., Mendez, D., Unterkalmsteiner, M., . . . Mohanani, R. (2025). Systematic mapping study on requirements engineering for regulatory compliance of software systems. Information and Software Technology, 178, Article ID 107622.
Open this publication in new window or tab >>Systematic mapping study on requirements engineering for regulatory compliance of software systems
Show others...
2025 (English)In: Information and Software Technology, ISSN 0950-5849, E-ISSN 1873-6025, Vol. 178, article id 107622Article, review/survey (Refereed) Published
Abstract [en]

Context: As the diversity and complexity of regulations affecting Software-Intensive Products and Services (SIPS) is increasing, software engineers need to address the growing regulatory scrutiny. We argue that, as with any other non-negotiable requirements, SIPS compliance should be addressed early in SIPS engineering—i.e., during requirements engineering (RE).

Objectives: In the conditions of the expanding regulatory landscape, existing research offers scattered insights into regulatory compliance of SIPS. This study addresses the pressing need for a structured overview of the state of the art in software RE and its contribution to regulatory compliance of SIPS.

Method: We conducted a systematic mapping study to provide an overview of the current state of research regarding challenges, principles, and practices for regulatory compliance of SIPS related to RE. We focused on the role of RE and its contribution to other SIPS lifecycle process areas. We retrieved 6914 studies published from 2017 (January 1) until 2023 (December 31) from four academic databases, which we filtered down to 280 relevant primary studies.

Results: We identified and categorized the RE-related challenges in regulatory compliance of SIPS and their potential connection to six types of principles and practices addressing challenges. We found that about 13.6% of the primary studies considered the involvement of both software engineers and legal experts in developing principles and practices. About 20.7% of primary studies considered RE in connection to other process areas. Most primary studies focused on a few popular regulation fields (privacy, quality) and application domains (healthcare, software development, avionics). Our results suggest that there can be differences in terms of challenges and involvement of stakeholders across different fields of regulation.

Conclusion: Our findings highlight the need for an in-depth investigation of stakeholders’ roles, relationships between process areas, and specific challenges for distinct regulatory fields to guide research and practice. 

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Compliance requirements, Regulatory compliance, Regulatory requirements engineering, Requirements engineering, Secondary research, Software compliance, Software engineering, Computer aided software engineering, Computer software reusability, Computer software selection and evaluation, Mapping, Software design, Software quality, Compliance requirement, Principles and practices, Process areas, Product and services, Regulatory requirement engineering, Regulatory requirements, Requirement engineering, Secondary researches, Application programs
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27180 (URN)10.1016/j.infsof.2024.107622 (DOI)001360553400001 ()2-s2.0-85209250611 (Scopus ID)
Available from: 2024-11-29 Created: 2024-11-29 Last updated: 2025-09-30Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Silva, C. & Fucci, D. (2025). The Perspective of Agile Software Developers on Data Privacy. Journal of Software: Evolution and Process, 37(2), Article ID e2755.
Open this publication in new window or tab >>The Perspective of Agile Software Developers on Data Privacy
Show others...
2025 (English)In: Journal of Software: Evolution and Process, ISSN 2047-7473, E-ISSN 2047-7481, Vol. 37, no 2, article id e2755Article in journal (Refereed) Published
Abstract [en]

Recent studies have shown that many software developers do not have sufficient knowledge and understanding of how to develop a privacy-friendly system. This may become a challenge in developing systems complying with data protection laws. To address this issue, we investigated the factors that influence developers' decision-making when developing privacy-sensitive systems.

We conducted an empirical study by means of a survey with 109 practitioners. Our data analysis is based on the principles of social cognitive theory, which includes personal, behavioral, and external environmental factors.

We identified six personal, five behavioral, and five external environment factors that affect how developers make decisions regarding privacy, including confusion between privacy and security and reliance on informal practices and organizational support gaps. These findings contribute to understanding how practitioners and companies consider privacy, showing improvements in formal training and structured support over previous studies yet highlighting persistent challenges in consistent privacy integration. 

Place, publisher, year, edition, pages
John Wiley & Sons, 2025
Keywords
empirical study, privacy, software development, Agile softwares, Data protection laws, Decisions makings, Empirical studies, Environmental factors, External environments, Sensitive systems, Social cognitive theory, Software developer, Differential privacy
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-27356 (URN)10.1002/smr.2755 (DOI)001389574100001 ()2-s2.0-85212760764 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2025-01-03 Created: 2025-01-03 Last updated: 2025-09-30Bibliographically approved
Jedrzejewski, F., Fucci, D. & Adamov, O. (2025). ThreMoLIA: Threat Modeling of Large Language Model-Integrated Applications. In: Babar M.A., Tosun A., Wagner S., Stray V. (Ed.), Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering , EASE, 2025 edition, EASE 2025: . Paper presented at 29th International Conference on Evaluation and Assessment of Software Engineering, EASE 2025, Istanbul, June 17-20, 2025 (pp. 834-839). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>ThreMoLIA: Threat Modeling of Large Language Model-Integrated Applications
2025 (English)In: Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering , EASE, 2025 edition, EASE 2025 / [ed] Babar M.A., Tosun A., Wagner S., Stray V., Association for Computing Machinery (ACM), 2025, p. 834-839Conference paper, Published paper (Refereed)
Abstract [en]

Large Language Models (LLMs) are currently being integrated into industrial software applications to help users perform more complex tasks in less time. However, these LLM-Integrated Applications (LIA) expand the attack surface and introduce new kinds of threats. Threat modeling is commonly used to identify these threats and suggest mitigations. However, it is a time-consuming practice that requires the involvement of a security practitioner. Our goals are to 1) provide a method for performing threat modeling for LIAs early in their lifecycle, (2) develop a threat modeling tool that integrates existing threat models, and (3) ensure high-quality threat modeling. To achieve the goals, we work in collaboration with our industry partner. Our proposed way of performing threat modeling will benefit industry by requiring fewer security experts' participation and reducing the time spent on this activity. Our proposed tool combines LLMs and Retrieval Augmented Generation (RAG) and uses sources such as existing threat models and application architecture repositories to continuously create and update threat models. We propose to evaluate the tool offline - i.e., using benchmarking - and online with practitioners in the field. We conducted an early evaluation using ChatGPT on a simple LIA and obtained results that encouraged us to proceed with our research efforts.  

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
AI4SE, and SE4AI., LLM-integrated Applications, Secure Software Engineering, Threat Modeling, Artificial intelligence, Benchmarking, Human engineering, Information systems, Modeling languages, Complex task, Industrial software, Integrated applications, Language model, Large language model-integrated application, Software applications, Application programs
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-29120 (URN)10.1145/3756681.3757083 (DOI)2-s2.0-105026943348 (Scopus ID)9798400713859 (ISBN)
Conference
29th International Conference on Evaluation and Assessment of Software Engineering, EASE 2025, Istanbul, June 17-20, 2025
Funder
Knowledge Foundation, 20180010Vinnova, 2024-00659
Available from: 2026-01-23 Created: 2026-01-23 Last updated: 2026-01-23Bibliographically approved
Peixoto, M., Gorschek, T., Mendez, D., Fucci, D. & Silva, C. (2024). A natural language-based method to specify privacy requirements: an evaluation with practitioners. Requirements Engineering, 29(3), 279-301
Open this publication in new window or tab >>A natural language-based method to specify privacy requirements: an evaluation with practitioners
Show others...
2024 (English)In: Requirements Engineering, ISSN 0947-3602, E-ISSN 1432-010X, Vol. 29, no 3, p. 279-301Article in journal (Refereed) Published
Abstract [en]

Organisations are becoming concerned with effectively dealing with privacy-related requirements. Existing Requirements Engineering methods based on structured natural language suffer from several limitations both in eliciting and specifying privacy requirements. In our previous study, we proposed a structured natural-language approach called the “Privacy Criteria Method” (PCM), which demonstrates potential advantages over user stories. Our goal is to present a PCM evaluation that focused on the opinions of software practitioners from different companies on PCM’s ability to support the specification of privacy requirements and the quality of the privacy requirements specifications produced by these software practitioners. We conducted a multiple case study to evaluate PCM in four different industrial contexts. We gathered and analysed the opinions of 21 practitioners on PCM usage regarding Coverage, Applicability, Usefulness, and Scalability. Moreover, we assessed the syntactic and semantic quality of the PCM artifacts produced by these practitioners. PCM can aid developers in elaborating requirements specifications focused on privacy with good quality. The practitioners found PCM to be useful for their companies’ development processes. PCM is considered a promising method for specifying privacy requirements. Some slight extensions of PCM may be required to tailor the method to the characteristics of the company. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.

Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2024
Keywords
Empirical study, Privacy criteria method, Privacy requirements specification, Software development, Quality control, Requirements engineering, Semantics, Software design, Empirical studies, Engineering methods, Natural languages, Privacy requirement specification, Privacy requirements, Requirement engineering, Requirements specifications, Software practitioners, User stories, Specifications
National Category
Software Engineering
Identifiers
urn:nbn:se:bth-26772 (URN)10.1007/s00766-024-00428-z (DOI)001272283700001 ()2-s2.0-85198939572 (Scopus ID)
Funder
Knowledge Foundation, 20180010
Available from: 2024-08-09 Created: 2024-08-09 Last updated: 2025-09-30Bibliographically approved
Projects
SESAM – Secure Software Engineering Through Sensible AutoMation [20230087]; Blekinge Institute of Technology; Publications
Fucci, D., Di Penta, M., Romano, S. & Scanniello, G. (2025). Augmenting Software Bills of Materials with Software Vulnerability Description: A Preliminary Study on GitHub. In: Li, J (Ed.), FSE Companion '25: Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering. Paper presented at 33rd ACM International Conference on the Foundations of Software Engineering, FSE Companion 2025, Trondheim, June 23-27, 2025 (pp. 631-635). Association for Computing Machinery (ACM)
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-0679-4361

Search in DiVA

Show all publications