{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:35:20Z","timestamp":1774679720352,"version":"3.50.1"},"reference-count":182,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020"},{"name":"DevOps for Complex Cyber-physical Systems","award":["957254-COSMOS"],"award-info":[{"award-number":["957254-COSMOS"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,7,31]]},"abstract":"<jats:p>Unmanned Aerial Vehicles (UAVs) are nowadays used in a variety of applications. Given the cyber-physical nature of UAVs, software defects in these systems can cause issues with safety-critical implications. An important aspect of the lifecycle of UAV software is to minimize the possibility of harming humans or damaging properties through a continuous process of hazard identification and safety risk management. Specifically, safety-related concerns typically emerge during the operation of UAV systems, reported by end-users and developers in the form of issue reports and pull requests. However, popular UAV systems daily receive tens or hundreds of reports of varying types and quality. To help developers timely identify and triage safety-critical UAV issues, we (i) experiment with automated approaches (previously used for issue classification) for detecting the safety-related matters appearing in the titles and descriptions of issues and pull requests reported in UAV platforms and (ii) propose a categorization of the main hazards and accidents discussed in such issues. Our results (i) show that shallow machine learning (ML)-based approaches can identify safety-related sentences with precision, recall, and F-measure values of about 80%; and (ii) provide a categorization and description of the relationships between safety issue hazards and accidents.<\/jats:p>","DOI":"10.1145\/3564821","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T11:25:48Z","timestamp":1664277948000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3192-739X","authenticated-orcid":false,"given":"Andrea","family":"Di Sorbo","sequence":"first","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7098-8964","authenticated-orcid":false,"given":"Fiorella","family":"Zampetti","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0558-4450","authenticated-orcid":false,"given":"Aaron","family":"Visaggio","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0340-9747","authenticated-orcid":false,"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4120-626X","authenticated-orcid":false,"given":"Sebastiano","family":"Panichella","sequence":"additional","affiliation":[{"name":"Zurich University of Applied Sciences, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2023,4,26]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180160"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.803"},{"key":"e_1_3_3_4_2","first-page":"2","volume-title":"Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering","author":"Antoniol Giuliano","year":"2018","unstructured":"Giuliano Antoniol, Kamel Ayari, Massimiliano Di Penta, Foutse Khomh, and Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc. 2018. Is it a bug or an enhancement?: A text-based approach to classify change requests. In Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering. 2\u201316. Retrieved from https:\/\/dl.acm.org\/citation.cfm?id=3291293."},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"e_1_3_3_6_2","unstructured":"Ardupilot.org. 2021. Open Source Drone Software. Versatile Trusted Open. ArduPilot. Retrieved January 30 2022 from https:\/\/ardupilot.org\/."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2018.2879631"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379177.3388904"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.5555\/553876"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/553876"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.7494\/csci.2021.22.1.3547"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21041518"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21248253"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/2986459.2986743"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2188395"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985472"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00030"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533818"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422584.3422763"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081875"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.14"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106285"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2019.2919819"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107495"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380381"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00034"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_3_3_31_2","first-page":"309","volume-title":"Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing","author":"Cohen William W.","year":"2004","unstructured":"William W. Cohen, Vitor R. Carvalho, and Tom M. Mitchell. 2004. Learning to classify email into \u201cspeech acts\u201d. In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing. 309\u2013316."},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682323"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.2326952"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66266-4_11"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2335995"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_5"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.199"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3126521"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2316"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950299"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.5"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.12"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889170"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6207783"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.42"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2894784.2894798"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183475"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2658577"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2016.2640362"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.abh1221"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2014.6906584"},{"key":"e_1_3_3_52_2","unstructured":"Fortune Business Insights. 2020. Market Research Report: Unmanned Aerial Vehicle (UAV) Market Size Share & COVID-19 Impact Analysis By Class (Small UAVs Tactical UAVs and Strategic UAVs) By Technology (Remotely Operated Semi-autonomous and Fully-autonomous) By System (UAV Airframe UAV Payloads UAV Avionics UAV Propulsion and UAV Software) By Application (Military Commercial and Recreational) and Regional Forecast 2020-2027. (2020). Retrieved January 30 2022 from https:\/\/www.fortunebusinessinsights.com\/industry-reports\/unmanned-aerial-vehicle-uav-market-101603."},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380397"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10260-015-0315-x"},{"key":"e_1_3_3_55_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #292. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/292."},{"key":"e_1_3_3_56_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #374. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/374."},{"key":"e_1_3_3_57_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #572. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/572."},{"key":"e_1_3_3_58_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #616. Retrieved February 19 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/616."},{"key":"e_1_3_3_59_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #647. Retrieved January 28 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/647."},{"key":"e_1_3_3_60_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #656. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/656."},{"key":"e_1_3_3_61_2","unstructured":"Github.com. 2013. ArduPilot\/ardupilot Issue #697. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/697. (Last access: 18\/02\/2022)."},{"key":"e_1_3_3_62_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #1164. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/1164."},{"key":"e_1_3_3_63_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #1254. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/1254."},{"key":"e_1_3_3_64_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #1372. Retrieved February 19 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/1372."},{"key":"e_1_3_3_65_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #1516. Retrieved January 30 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/1516."},{"key":"e_1_3_3_66_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #1648. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/1648."},{"key":"e_1_3_3_67_2","unstructured":"Github.com. 2014. ArduPilot\/ardupilot Issue #841. Retrieved January 30 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/841."},{"key":"e_1_3_3_68_2","unstructured":"Github.com. 2014. d-ronin\/dRonin Issue #1234. Retrieved February 18 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/1234."},{"key":"e_1_3_3_69_2","unstructured":"Github.com. 2015. ArduPilot\/ardupilot Issue #2190. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/2190."},{"key":"e_1_3_3_70_2","unstructured":"Github.com. 2015. ArduPilot\/ardupilot Issue #2666. Retrieved January 28 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/2666."},{"key":"e_1_3_3_71_2","unstructured":"Github.com. 2015. d-ronin\/dRonin Pull Request #275. Retrieved February 19 2022 from https:\/\/github.com\/d-ronin\/dRonin\/pull\/275."},{"key":"e_1_3_3_72_2","unstructured":"Github.com. 2015. d-ronin\/dRonin Pull Request #342. Retrieved February 18 2022 from https:\/\/github.com\/d-ronin\/dRonin\/pull\/342."},{"key":"e_1_3_3_73_2","unstructured":"Github.com. 2016. ArduPilot\/ardupilot Issue #2011. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/2011."},{"key":"e_1_3_3_74_2","unstructured":"Github.com. 2016. ArduPilot\/ardupilot Pull Request #3669. Retrieved January 31 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/3669."},{"key":"e_1_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Github.com. 2016. d-ronin\/dRonin Issue #1123. Retrieved January 28 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/1123.","DOI":"10.1002\/lt.26147"},{"key":"e_1_3_3_76_2","unstructured":"Github.com. 2016. d-ronin\/dRonin Issue #406. Retrieved February 19 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/406."},{"key":"e_1_3_3_77_2","unstructured":"Github.com. 2016. d-ronin\/dRonin Issue #587. Retrieved February 19 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/587."},{"key":"e_1_3_3_78_2","unstructured":"Github.com. 2016. d-ronin\/dRonin Issue #642. Retrieved February 19 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/642."},{"key":"e_1_3_3_79_2","unstructured":"Github.com. 2016. d-ronin\/dRonin Pull request #1129. Retrieved February 18 2022 from https:\/\/github.com\/d-ronin\/dRonin\/issues\/1129."},{"key":"e_1_3_3_80_2","unstructured":"Github.com. 2017. ArduPilot\/ardupilot Issue #6649. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/6649."},{"key":"e_1_3_3_81_2","unstructured":"Github.com. 2017. ArduPilot\/ardupilot Pull Request #7074. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/7074."},{"key":"e_1_3_3_82_2","unstructured":"Github.com. 2017. d-ronin\/dRonin Pull Request #1516. Retrieved February 18 2022 from https:\/\/github.com\/d-ronin\/dRonin\/pull\/1516."},{"key":"e_1_3_3_83_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request # 8039. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/8039."},{"key":"e_1_3_3_84_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request #7440. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/7440."},{"key":"e_1_3_3_85_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request #8180. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/8180."},{"key":"e_1_3_3_86_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request #9381. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/9381."},{"key":"e_1_3_3_87_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request #9858. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/9858."},{"key":"e_1_3_3_88_2","unstructured":"Github.com. 2018. ArduPilot\/ardupilot Pull Request #9941. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/9941."},{"key":"e_1_3_3_89_2","unstructured":"Github.com. 2019. ArduPilot\/ardupilot Pull Request #11025. Retrieved January 30 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/11025."},{"key":"e_1_3_3_90_2","unstructured":"Github.com. 2019. ArduPilot\/ardupilot Pull Request #12439. Retrieved February 19 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/12439."},{"key":"e_1_3_3_91_2","unstructured":"Github.com. 2019. PX4\/PX4-Autopilot Pull Request #13560. Retrieved February 18 2022 from https:\/\/github.com\/PX4\/PX4-Autopilot\/pull\/13560."},{"key":"e_1_3_3_92_2","unstructured":"Github.com. 2020. ArduPilot\/ardupilot Issue #15608. Retrieved January 30 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/issues\/15608."},{"key":"e_1_3_3_93_2","unstructured":"Github.com. 2020. ArduPilot\/ardupilot Pull Request #15092. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/15092."},{"key":"e_1_3_3_94_2","unstructured":"Github.com. 2020. PX4\/PX4-Autopilot Issue #15065. Retrieved January 28 2022 from https:\/\/github.com\/PX4\/PX4-Autopilot\/issues\/15065."},{"key":"e_1_3_3_95_2","unstructured":"Github.com. 2020. PX4\/PX4-Autopilot Pull Request #13926. Retrieved February 18 2022 from https:\/\/github.com\/PX4\/PX4-Autopilot\/pull\/13926."},{"key":"e_1_3_3_96_2","unstructured":"Github.com. 2020. PX4\/PX4-Autopilot Pull Request #14428. Retrieved February 18 2022 from https:\/\/github.com\/PX4\/PX4-Autopilot\/pull\/14428."},{"key":"e_1_3_3_97_2","unstructured":"Github.com. 2021. ArduPilot\/ardupilot Pull Request #16594. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/16594."},{"key":"e_1_3_3_98_2","unstructured":"Github.com. 2021. ArduPilot\/ardupilot Pull Request #16604. Retrieved February 18 2022 from https:\/\/github.com\/ArduPilot\/ardupilot\/pull\/16604."},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806871"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00029"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09885-w"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1798"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-012-9321-0"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2018.08.039"},{"key":"e_1_3_3_106_2","unstructured":"International Civil Aviation Organization (ICAO). 2013. Safety management manual; 3rd ed.; Doc 9859. (2013)."},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00018"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-021-00475-2"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00070"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2020.102598"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26844-6_22"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901751"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138027"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3376127"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659054"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/7474.7528"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/102792.102799"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219816"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.235116"},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(83)90030-4"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00119"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/MET.2017.6"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417673"},{"key":"e_1_3_3_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10096"},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEsCPS.2017.8"},{"key":"e_1_3_3_126_2","article-title":"Induction of decision trees","author":"Martinez-Taboada Fernando","year":"2020","unstructured":"Fernando Martinez-Taboada and Jose Ignacio Redondo. 2020. Induction of decision trees. PLOS ONE (2020).","journal-title":"PLOS ONE"},{"key":"e_1_3_3_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.94"},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/2808194.2809496"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02295996"},{"key":"e_1_3_3_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7140074"},{"key":"e_1_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5980409"},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338920"},{"key":"e_1_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183464"},{"key":"e_1_3_3_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2015.2479878"},{"key":"e_1_3_3_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2015.2463671"},{"key":"e_1_3_3_136_2","doi-asserted-by":"crossref","unstructured":"A. Jefferson Offutt and Aynur Abdurazik. 1999. Generating tests from UML specifications. In Proceedings of the International Conference on the Unified Modeling Language . Springer 416\u2013429.","DOI":"10.1007\/3-540-46852-8_30"},{"key":"e_1_3_3_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8202315"},{"key":"e_1_3_3_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/VST.2018.8327148"},{"key":"e_1_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106665"},{"key":"e_1_3_3_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.3390\/machines5010006"},{"key":"e_1_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.3390\/make2040031"},{"key":"e_1_3_3_143_2","unstructured":"Pixhawk.org. 2021. Pixhawk | The hardware standard for open-source autopilots. Retrieved January 30 2022 from https:\/\/pixhawk.org\/."},{"key":"e_1_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2018.2853729"},{"key":"e_1_3_3_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2933324"},{"key":"e_1_3_3_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/LA-CCI.2017.8285711"},{"key":"e_1_3_3_147_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111047"},{"key":"e_1_3_3_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806872"},{"key":"e_1_3_3_149_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28872-7_37"},{"key":"e_1_3_3_150_2","doi-asserted-by":"publisher","DOI":"10.3390\/rs13102010"},{"key":"e_1_3_3_151_2","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0048-x"},{"key":"e_1_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2021.3050609"},{"key":"e_1_3_3_153_2","volume-title":"Software Engineering (9th ed.)","author":"Sommerville Ian","year":"2010","unstructured":"Ian Sommerville. 2010. Software Engineering (9th ed.). Addison-Wesley, Harlow, England."},{"key":"e_1_3_3_154_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417928"},{"key":"e_1_3_3_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2015.7085626"},{"key":"e_1_3_3_156_2","volume-title":"Card Sorting: Designing Usable Categories","author":"Spencer Donna","year":"2009","unstructured":"Donna Spencer. 2009. Card Sorting: Designing Usable Categories. Rosenfeld Media."},{"key":"e_1_3_3_157_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35333-9_26"},{"key":"e_1_3_3_158_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380353"},{"key":"e_1_3_3_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2020.3048875"},{"key":"e_1_3_3_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169512"},{"key":"e_1_3_3_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS51884.2021.9476844"},{"key":"e_1_3_3_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00057"},{"key":"e_1_3_3_163_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"e_1_3_3_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00040"},{"key":"e_1_3_3_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00022"},{"key":"e_1_3_3_166_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9478-6"},{"key":"e_1_3_3_167_2","unstructured":"Chris Cole Drone Wars UK. 2019. ACCIDENTS WILL HAPPEN - A review of military drone crash data as the UK considers allowing large military drone flights in its airspace. Retrieved January 30 2022 from https:\/\/dronewars.net\/wp-content\/uploads\/2019\/06\/DW-Accidents-WEB.pdf."},{"key":"e_1_3_3_168_2","unstructured":"U.S. Dept. Of Defense. 1984. MIL-STD-882B:System Safety Program Requirements. US DoD (1984)."},{"key":"e_1_3_3_169_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468534"},{"key":"e_1_3_3_170_2","volume-title":"Software Fault Injection: Inoculating Programs against Errors","author":"Voas Jeffrey M.","year":"1997","unstructured":"Jeffrey M. Voas and Gary McGraw. 1997. Software Fault Injection: Inoculating Programs against Errors. John Wiley & Sons, Inc., USA."},{"key":"e_1_3_3_171_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468559"},{"key":"e_1_3_3_172_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106845"},{"key":"e_1_3_3_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/IBF50092.2020.9034539"},{"key":"e_1_3_3_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_3_175_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_3_176_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79721-0_68"},{"key":"e_1_3_3_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673127"},{"key":"e_1_3_3_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.43"},{"key":"e_1_3_3_179_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-021-1230-x"},{"key":"e_1_3_3_180_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111425"},{"key":"e_1_3_3_181_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"},{"key":"e_1_3_3_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.53"},{"key":"e_1_3_3_183_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1770"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:23Z","timestamp":1750182683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":182,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,7,31]]}},"alternative-id":["10.1145\/3564821"],"URL":"https:\/\/doi.org\/10.1145\/3564821","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,26]]},"assertion":[{"value":"2022-03-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}