{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:12:03Z","timestamp":1775617923794,"version":"3.50.1"},"reference-count":167,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme","award":["871319"],"award-info":[{"award-number":["871319"]}]},{"DOI":"10.13039\/100003077","name":"Knowledge Foundation","doi-asserted-by":"publisher","award":["20160139 (TestMine)"],"award-info":[{"award-number":["20160139 (TestMine)"]}],"id":[{"id":"10.13039\/100003077","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2019YFB1704003"],"award-info":[{"award-number":["2019YFB1704003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2971712","type":"journal-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T23:34:36Z","timestamp":1580945676000},"page":"36226-36243","source":"Crossref","is-referenced-by-count":61,"title":["On Using Grey Literature and Google Scholar in Systematic Literature Reviews in Software Engineering"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0166-2239","authenticated-orcid":false,"given":"Affan","family":"Yasin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7144-1925","authenticated-orcid":false,"given":"Rubia","family":"Fatima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0358-3160","authenticated-orcid":false,"given":"Lijie","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0611-2655","authenticated-orcid":false,"given":"Wasif","family":"Afzal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-0270","authenticated-orcid":false,"given":"Muhammad","family":"Azhar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0118-8143","authenticated-orcid":false,"given":"Richard","family":"Torkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00156-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.03.051"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.02.005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2008.12.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.12.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.03.089"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.06.011"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.007"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2464526.2464533"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.01.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.59"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7762d","DOI":"10.1136\/bmj.d7762","article-title":"Assessment of publication bias, selection bias, and unavailable data in meta-analyses using individual participant data: A database survey","volume":"344","author":"ahmed","year":"2012","journal-title":"Brit Med J"},{"key":"ref22","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314238"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.16"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/3356773.3356797","article-title":"The use of grey literature review as evidence for practitioners","volume":"44","author":"kamei","year":"2019","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.46"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.113"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851978"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.002"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.009"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.113"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.56"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-642-17694-4_4","article-title":"Service identification methods: A systematic literature review","volume":"6481","author":"gu","year":"2010","journal-title":"Towards a Service-Based Internet"},{"key":"ref155","first-page":"261","article-title":"A framework for defect prediction in specific software project contexts","volume":"4980","author":"wahyudin","year":"2008","journal-title":"Proc Softw Eng Techn -3rd IFIP TC 2 Central East Eur Conf CEE-SET"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2006.11.006"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.70"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.51"},{"key":"ref146","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.infsof.2009.04.004","article-title":"Definitions and approaches to model quality in model-based software development&#x2014;A review of literature","volume":"51","author":"mohagheghi","year":"2009","journal-title":"Inf Softw Technol"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.08.019"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.12.010"},{"key":"ref149","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1016\/j.infsof.2009.04.001","article-title":"On the generation of requirements specifications from software engineering models: A systematic literature review","volume":"51","author":"nicol\u00e1s","year":"2009","journal-title":"Inf Softw Technol"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","article-title":"Empirical studies of agile software development: A systematic review","volume":"50","author":"dyb\u00e5","year":"2008","journal-title":"Inf Softw Technol"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.005"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.07.002"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.12.002"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1016\/j.infsof.2010.08.003","article-title":"Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review","volume":"53","author":"khan","year":"2011","journal-title":"Inf Softw Technol"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.01.001"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.006"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.infsof.2009.07.001","article-title":"A systematic review on regression test selection techniques","volume":"52","author":"engstr\u00f6m","year":"2010","journal-title":"Inf Softw Technol"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.904"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0019"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2010.5640467"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/MySEC.2011.6140648"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0017"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2009.5071355"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIT.2010.5492781"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2011.0002"},{"key":"ref160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2004.10.006","article-title":"Systematic reviews in evidence-based software technology and software engineering","volume":"47","author":"dyer","year":"2005","journal-title":"Inf Softw Technol"},{"key":"ref4","first-page":"115","article-title":"Grey market science: Research libraries, grey literature, and the legitimization of scientific discourse in the Internet age","author":"gelfand","year":"2002","journal-title":"Proc Socioeconomic Dimensions Electron Workshop"},{"key":"ref3","first-page":"117","article-title":"Czech national repository of grey literature","author":"pej\u0161ov\u00e1","year":"2010","journal-title":"GreyNet"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/469286a"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02910856"},{"key":"ref159","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.infsof.2010.12.007","article-title":"A systematic literature review of actionable alert identification techniques for automated static code analysis","volume":"53","author":"heckman","year":"2011","journal-title":"Inf Softw Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005690102069"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.01.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1300\/J105v27n02_07"},{"key":"ref157","first-page":"69","article-title":"The virtual workplace of a mobile employee&#x2014;How does Vischer&#x2019;s model function in identifying physical, functional and psychosocial fit?","volume":"6763","author":"hyrkk\u00e4nen","year":"2011","journal-title":"Proc 14th Int Conf Hum -Comput Interact Towards Mobile Intell Interact Environments (HCI)"},{"key":"ref158","first-page":"81","article-title":"Variability management in software product lines: A systematic review","volume":"446","author":"chen","year":"2009","journal-title":"Proc 13th Int Conf Softw Product Lines (SPLC)"},{"key":"ref9","first-page":"1","article-title":"Grey literature acquisition and management: Challenges in academic libraries in Africa","author":"osayande","year":"2012","journal-title":"Grey Literature Acquisition Manage Challenges Acad Libraries Africa"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.048"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.006"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.01.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.02.002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.003"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17694-4_13"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256943"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/IWSPM.2011.6046201"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2009.25"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.08.028"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.009"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-3-642-16129-2_16","article-title":"A systematic review of the use of requirements engineering techniques in model-driven development","volume":"6395","author":"loniewski","year":"2010","journal-title":"Proc Int Conf on Model Driven Engineering Languages and Systems (MoDELS)"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.005"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28714-5_22"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.075"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.04.004"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0111-y"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.05.004"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.014"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.04.004"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23801-7_3"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/978-3-642-21843-9_25","article-title":"Critical issues on test-driven development","volume":"6759","author":"kollanus","year":"2011","journal-title":"Proc 12th Int Conf Product-Focused Softw Process Improvement (PROFES)"},{"key":"ref131","first-page":"258","article-title":"A systematic review on the impact of CK metrics on the functional correctness of object-oriented classes","volume":"7336","author":"khan","year":"2012","journal-title":"Proc 12th Int Conf Comput Sci Appl (ICCSA)"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.infsof.2010.05.011","article-title":"Software product line testing&#x2014;A systematic mapping study","volume":"53","author":"engstr\u00f6m","year":"2011","journal-title":"Inf Softw Technol"},{"key":"ref132","first-page":"185","article-title":"Awareness support in global software development: A systematic review based on the 3C collaboration model","volume":"6257","author":"steinmacher","year":"2010","journal-title":"Proc 16th Int Conf Collaboration Technol (CRIWG)"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.008"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0080-1"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04394-9_62"},{"key":"ref138","first-page":"177","article-title":"Applicability of the semiotic inspection method: A systematic literature review","author":"reis","year":"2011","journal-title":"Proc 10th Brazilian Symp Hum Factors Comput Syst 5th Latin Amer Conf Human Comput Interact (IHC CLIHC)"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02818-2_20"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.003"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.09.046"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.12.008"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.11.002"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1016\/j.infsof.2008.03.006","article-title":"Knowledge management in software engineering: A systematic review of studied concepts, findings and research methods used","volume":"50","author":"bj\u00f8rnson","year":"2008","journal-title":"Inf Softw Technol"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110418"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414011"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.001"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/1370062.1370080"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.009"},{"key":"ref143","first-page":"1","article-title":"Research in concurrent software testing: A systematic review","author":"do r s de souza","year":"2011","journal-title":"Proc 9th Workshop Parallel Distrib Syst Test Anal Debugging (PADTAD)"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1016\/j.infsof.2007.09.004","article-title":"Motivation in software engineering: A systematic literature review","volume":"50","author":"beecham","year":"2008","journal-title":"Inf Softw Technol"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852788"},{"key":"ref2","author":"soule","year":"2020","journal-title":"Grey Literature&#x2014;Technical Briefing"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.03.041"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990686"},{"key":"ref1","article-title":"Grey literature acquisition and management: Challenges in academic libraries in Africa","author":"osayande","year":"2012"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.19"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314233"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.195"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314238"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.26"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.33"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.17"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.19"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.59"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2010.14"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.17"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314228"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1001"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2010.15"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2009.5332001"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2009.11"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2010.55"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.014"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.28"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.48"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.52"},{"key":"ref10","author":"soule","year":"1999","journal-title":"Gray Literature Technical Briefing"},{"key":"ref11","article-title":"Grey literature repositories","author":"vaska","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF02910856"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/EL-02-2017-0039"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.006"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0125"},{"key":"ref16","first-page":"85","article-title":"Grey literature publishing in public policy: Production and management, costs and benefits","author":"lawrence","year":"2017","journal-title":"Proc 21st Int Conf Electron Expanding Perspect Open Sci Communities Cultures Diversity Concepts Practices"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1016\/j.infsof.2010.03.006","article-title":"Systematic literature reviews in software engineering&#x2014;A tertiary study","volume":"52","author":"kitchenham","year":"2010","journal-title":"Inf Softw Technol"},{"key":"ref117","first-page":"738","article-title":"Systematic literature review of virtual role","author":"noponen","year":"2011","journal-title":"Proc Int Conf Internet Technol Secured Trans (ICITST)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/ISU-170857"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/EL-05-2018-0100"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.infsof.2010.11.014","article-title":"Testing in service oriented architectures with dynamic binding: A mapping study","volume":"53","author":"palacios","year":"2011","journal-title":"Inf Softw Technol"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.33"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1108\/eb026934"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.07.003"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2010.28"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2011.6046251"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.50"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00011-9"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE-W.2011.12"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.73"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.027"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5315982"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/SEAA.2008.47","article-title":"Towards a defect prevention based process improvement approach","author":"kalinowski","year":"2008","journal-title":"Proc 34th Euromicro Conf Software Engineering and Advanced Applications"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2011.24"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.02.001"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.02.006"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2011.12.004"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.02.007"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08984351.pdf?arnumber=8984351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T19:42:34Z","timestamp":1643312554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8984351\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":167,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2971712","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}