This work is licensed under the Creative Commons Attribution 4.0 International License.
Gobert, M., Nagy, C., Rocha, H., Demeyer, S., & Cleve, A. (2023). Best practices of testing database manipulation code. Information systems.Search in Google Scholar
Raksawat, C., & Charoenporn, P. (2021). Software testing system development based on iso 29119. Engineering and Technology Publishing(2).Search in Google Scholar
Villani, EmiliaPontes, Rodrigo PastlCoracini, Guilherme KisseloflAmbrosio, Ana Maria. (2019). Integrating model checking and model based testing for industrial software development. Computers in Industry, 104.Search in Google Scholar
Martinez-Ledezma, J. A., Barron-Zambrano, J. H., Diaz-Manriquez, A., Elizondo-Leal, J. C., & Rostro-Gonzalez, H. (2020). Versatile implementation of a hardware–software architecture for development and testing of brain–computer interfaces. International Journal of Advanced Robotic Systems, 17(6), 172988142098025.Search in Google Scholar
Minamino, Y., Inoue, S., & Yamada, S. (2016). Nhpp-based change-point modeling for software reliability assessment and its application to software development management. Annals of Operations Research, 244(1), 1-17.Search in Google Scholar
Kaliraj, M. R. S., & Bharathi, A. (2018). Path testing based reliability analysis framework of component based software system. Measurement.Search in Google Scholar
Subramanian, G. H., Pendharkar, P. C., & Pai, D. R. (2017). An examination of determinants of software testing and project management effort. Journal of computer information systems(2).Search in Google Scholar
Nath, P., Mushahary, J. R., Roy, U., Brahma, M., & Singh, P. K. (2023). Ai and blockchain-based source code vulnerability detection and prevention system for multiparty software development. Computers & Electrical Engineering, 106, 108607-.Search in Google Scholar
Burnashev, R. A., & Enikeev, A. I. (2016). Structuring of textual data and its processing with database management systems in the development of computer assisted testing systems for students. International journal of soft computing, 11(7), 444-447.Search in Google Scholar
Bukanin, V. A., Ivanov, A. N., & Boriskina, A. V. (2020). Experience of the distance testing system development and operation. Journal of Physics: Conference Series, 1691(1), 012170 (6pp).Search in Google Scholar
Kaydani, H., Mohebbi, A., & Baghaie, A. (2012). Neural fuzzy system development for theprediction of permeability from wireline databased on fuzzy clustering. Petroleum Science and Technology(17/20), 30.Search in Google Scholar
Budati, A. K., Snv, G., Cherukupalli, K., Anil, K. P., & Venkata, K. M. T. (2021). High speed data encryption technique with optimized memory based rsa algorithm for communications. Circuit World, ahead-of-print(ahead-of-print).Search in Google Scholar
Lee, Y. U. (2020). Secure visible light communication technique based on asymmetric data encryption for 6g communication service. Electronics, 9.Search in Google Scholar
Arulananth, T. S., Baskar, M., Anbarasu, V., Thiagarajan, R., Rajendran, T., & Balaji, A. (2021). Multi party secure data access management in cloud using user centric block chain data encryption. Pattern recognition letters(152-Dec.).Search in Google Scholar
Kumar, P., & Bhatt, A. K. (2020). Enhancing multi-tenancy security in the cloud computing using hybrid ecc-based data encryption approach. IET Communications, 14(18), 3212-3222.Search in Google Scholar
Chen, Y., Zhang, Y., Hu, G., & He, P. (2020). Database-assisted dynamic spectrum allocation method with spectrum security. International Journal of Performability Engineering(12), 16.Search in Google Scholar
A, A. Y., & B, N. T. A. D. (2019). Dynamically detecting security threats and updating a signature-based intrusion detection system’s database. Procedia Computer Science, 159, 1507-1516.Search in Google Scholar