1. Philip Achimugu, Ali Selamat, Roliana Ibrahim, and Mohd Naz’ri Mahrin. 2014. A systematic literature review of software requirements prioritization research. Information and software technology 56, 6 (2014), 568–585.
2. Adaptive Continuous Authentication System for Smartphones using Hyper Negative Selection and Random Forest Algorithms
3. Len Bass, Paul Clements, and Rick Kazman. 2003. Software architecture in practice. Addison-Wesley Professional.
4. Anne Bumiller, Stéphanie Challita, Benoit Combemale, Olivier Barais, Nicolas Aillery, and Gael Le Lan. 2023. On Understanding Context Modelling for Adaptive Authentication Systems. ACM Transactions on Autonomous and Adaptive Systems (2023).
5. Michele Di Santo, Nadia Ranaldo, and Eugenio Zimeo. 2004. A broker architecture for object-oriented master/slave computing in a hierarchical grid system. In Advances in Parallel Computing. Vol. 13. Elsevier, 609–615.