Modeling and selection of interdependent software requirements using fuzzy graphs

D Mougouei, DMW Powers - International Journal of Fuzzy Systems, 2017 - Springer
Software requirement selection is to find an optimal set of requirements that gives the
highest value for a release of software while keeping the cost within the budget. However …

An integer linear programming model for binary knapsack problem with dependent item values

D Mougouei, DMW Powers, A Moeini - … VIC, Australia, August 19–20, 2017 …, 2017 - Springer
Abstract Binary Knapsack Problem (BKP) is to select a subset of items with the highest value
while keeping the size within the capacity of the knapsack. This paper presents an Integer …

Dependency-aware software release planning

D Mougouei, DMW Powers… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
The existing software release planning models aim to find a subset of software requirements
with the highest value on the assumption that the value of a selected subset of requirements …

Dependency-aware software requirements selection using fuzzy graphs and integer programming

D Mougouei, DMW Powers - Expert Systems with Applications, 2021 - Elsevier
One of the critical activities in software development is Requirements Selection, which is to
find an optimal subset of the software requirements (features) with the highest value for a …

Dependency-aware software release planning through mining user preferences

D Mougouei, DMW Powers - Soft Computing, 2020 - Springer
Software vendors aim to find, for a release of the software, an optimal subset of features that
gives the highest value while respecting the resource limitations. The value of a feature …

Partial selection of software requirements: a fuzzy method

D Mougouei, E Mougouei, DMW Powers - International Journal of Fuzzy …, 2021 - Springer
Prioritization and selection of requirements are an essential component of software
development. The process, however, often leads to ignoring some requirements due to the …

[PDF][PDF] A fuzzy-based technique for describing security requirements of intrusion tolerant systems

D Mougouei, W Nurhayati - International Journal of Software …, 2013 - researchgate.net
To care for security in early stages of software development has always been a major
engineering trend. However, due to the existence of unpreventable and accidental security …

[PDF][PDF] Modelo de evaluación de seguridad para transmitir datos usando Web Services

EG Enciso, EP Flores - Industrial data, 2018 - redalyc.org
RESUMEN Los Web Services actuales ofrecen una variedad de soluciones de software
basadas en estándares para integrar aplicaciones y automatizar procesos de transferencia …

PAPS: a scalable framework for prioritization and partial selection of security requirements

D Mougouei - arXiv preprint arXiv:1706.00166, 2017 - arxiv.org
Owing to resource constraints, the existing prioritization and selection techniques for
software security requirements (countermeasures) find a subset of higher-priority security …

Impact evaluation of DDoS and Malware attack using IoT devices

R Maciel, J Araujo, C Melo, P Pereira… - Distributed Denial of …, 2021 - degruyter.com
Distributed denial-of-service (DDoS) attacks deny access to infrastructures of service
providers. These attacks can arise anytime, anywhere, and with little or no warning at all …