References
- Jinhee Park, Jongmoon Baik, “Improving software reliability prediction through multi criteria based dynamic model selection and combination”, The Journal of Systems and Software 101, Dec 2014.
- Dimov, A. and Punnekkat, Sasikumar. (2010) “Fuzzy Reliability Model for Component-Based Software Systems”. 36th EUROMICRO Conference on Software Engineering and Advanced Applications, Sofia, 1–3 September 2010, 39–46.
- Gopal Prasad Jaiswal, Ram Niwas Giri, “Software Reliability Estimation of Component Based Software System using Fuzzy Logic”, International Journal of Computer Applications, Vol 127 – No 7, October 2015.
- Gopal Prasad Jaiswal, Ram Niwas Giri, Dipesh Sharma, “Comparative Analysis on Reliability Estimation Techniques of Component based Software System”, Chhattisgarh, India, IJCST Vol-3, Issue 2, April 2015.
- Ayman Amin, Lars Grunske, Alan Colman, “An approach to software reliability prediction based on time series modelling”, The Journal of Systems and Software 86, Mar 2013.
- Suhas Hanamore, Santanu Kumar Rath, “A Web Service Reliability Prediction using HMM and Fuzzy Logic models”, India, ICACC 2016.
- Eric Afful D, Arnost Vesely, “User Perception of Security on Social Networking Sites Using Fuzzy Logic”, UK, British Journal of Applied Science and Technology, 2013.
- A A Sattikar, R V Kulkarni, “A Role of Artificial Intelligence Techniques in Security and Privacy Issues of Social Networking”, India, IJCSET, Vol 2, Issue 1, 2012
- Lokesh Jain, Satbir Jain, “A New Approach to Supervise Security in Social Network through Quantum Cryptography and Non-Linear Dimension Reduction Techniques”, Dwarka, India, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 6, 2010.
- Hellmich, Mario, “Statistical inference of a software reliability model by linear filtering” Journal of Statistics and Management Systems 19.2 (2016): 163–181. doi: 10.1080/09720510.2014.961801
- Kofahi, Najib A., “The impact of computer science and information technology teaching on the growth of software industry.” Journal of Discrete Mathematical Sciences and Cryptography 7.3 (2004): 371–386. doi: 10.1080/09720529.2004.10698015