{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T21:01:18Z","timestamp":1760821278892,"version":"3.37.3"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10515-021-00288-9","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T13:03:27Z","timestamp":1625835807000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["New failure rate model for iterative software development life cycle process"],"prefix":"10.1007","volume":"28","author":[{"family":"Sangeeta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0341-2927","authenticated-orcid":false,"family":"Sitender","sequence":"additional","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Manju","family":"Bala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"288_CR1","doi-asserted-by":"crossref","unstructured":"IEEE standard glossary of software engineering terminology. In: ANSI\/IEEE Std 729-1983, pp.1\u201340. IEEE (1983). https:\/\/doi.org\/10.1109\/ieeestd.1983.7435207","DOI":"10.1109\/IEEESTD.1983.7435207"},{"issue":"2","key":"288_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1166\/jctn.2012.2019","volume":"9","author":"A Abraham","year":"2012","unstructured":"Abraham, A., Jatoth, R.K., Rajasekhar, A.: Hybrid differential artificial bee colony algorithm. J. Comput. Theor. Nanosci. 9(2), 249\u2013257 (2012). https:\/\/doi.org\/10.1166\/jctn.2012.2019","journal-title":"J. Comput. Theor. Nanosci."},{"key":"288_CR3","doi-asserted-by":"crossref","unstructured":"Abrahamsson, P.: Extreme programming: first results from a controlled case study. In: Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat No 03CH37412) EURMIC-03, IEEE. https:\/\/doi.org\/10.1109\/eurmic.2003.1231599 (2003)","DOI":"10.1109\/EURMIC.2003.1231599"},{"key":"288_CR4","doi-asserted-by":"publisher","first-page":"4811","DOI":"10.1109\/access.2017.2787981","volume":"6","author":"MA Akbar","year":"2018","unstructured":"Akbar, M.A., Sang, J., Khan, A.A., Fazal-E-Amin, Nasrullah, Shafiq, M., Hussain, S., Hu, H., Elahi, M., Xiang, H.: Improving the quality of software development process by introducing a new methodology\u2013AZ-model. IEEE Access 6, 4811\u20134823 (2018). https:\/\/doi.org\/10.1109\/access.2017.2787981","journal-title":"IEEE Access"},{"key":"288_CR5","doi-asserted-by":"publisher","unstructured":"Basil, V.R., Turner, A.J.: Iterative enhancement: a practical technique for software development. IEEE Trans. Softw. Eng. SE-1(4), 390\u2013396 (1975). https:\/\/doi.org\/10.1109\/tse.1975.6312870","DOI":"10.1109\/tse.1975.6312870"},{"key":"288_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11633-019-1214-7","volume":"17","author":"R Bharathi","year":"2020","unstructured":"Bharathi, R., Selvarani, R.: Hidden Markov model approach for software reliability estimation with logic error. Int. J. Autom. Comput. 17, 1\u201316 (2020)","journal-title":"Int. J. Autom. Comput."},{"key":"288_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TSE.1984.5010193","volume":"1","author":"BW Boehm","year":"1984","unstructured":"Boehm, B.W.: Software engineering economics. IEEE Trans. Softw. Eng. 1, 4\u201321 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"288_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/12944.12948","volume":"11","author":"B Boehm","year":"1986","unstructured":"Boehm, B.: A spiral model of software development and enhancement. ACM SIGSOFT Softw. Eng. Notes 11(4), 14\u201324 (1986). https:\/\/doi.org\/10.1145\/12944.12948","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"9","key":"288_CR9","doi-asserted-by":"publisher","first-page":"3578","DOI":"10.1016\/j.apm.2008.11.018","volume":"33","author":"YC Chang","year":"2009","unstructured":"Chang, Y.C., Liu, C.T.: A generalized JM model with applications to imperfect debugging in software reliability. Appl. Math. Modell. 33(9), 3578\u20133588 (2009). https:\/\/doi.org\/10.1016\/j.apm.2008.11.018","journal-title":"Appl. Math. Modell."},{"issue":"2","key":"288_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1002\/stvr.459","volume":"23","author":"RK Garg","year":"2011","unstructured":"Garg, R.K., Sharma, K., Nagpal, C.K., Garg, R., Garg, R., Kumar, R., Sandhya: Ranking of software engineering metrics by fuzzy-based matrix methodology. Softw. Test. Verif. Reliab. 23(2), 149\u2013168 (2011). https:\/\/doi.org\/10.1002\/stvr.459","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"1\/4","key":"288_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/a:1018923329647","volume":"8","author":"SS Gokhale","year":"1999","unstructured":"Gokhale, S.S., Trivedi, K.S.: A time\/structure based software reliability model. Ann. Softw. Eng. 8(1\/4), 85\u2013121 (1999). https:\/\/doi.org\/10.1023\/a:1018923329647","journal-title":"Ann. Softw. Eng."},{"key":"288_CR13","unstructured":"Gokhale, S.S., Marinos, P.N., Trivedi, K.S.: Important milestones in software reliability modeling. Tech. rep., North Carolina State University. Center for Advanced Computing and Communication (1996)"},{"key":"288_CR11","doi-asserted-by":"crossref","unstructured":"Gokhale, S., Wong, W., Trivedi, K., Horgan, J.: An analytical approach to architecture-based software reliability prediction. In: Proceedings. IEEE International Computer Performance and Dependability Symposium. IPDS-98 (Cat. No.98TB100248). IEEE Computer Society (1998). https:\/\/doi.org\/10.1109\/ipds.1998.707705","DOI":"10.1109\/IPDS.1998.707705"},{"issue":"3","key":"288_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/b:sqjo.0000034709.63615.8b","volume":"12","author":"SS Gokhale","year":"2004","unstructured":"Gokhale, S.S., Lyu, M.R., Trivedi, K.S.: Analysis of software fault removal policies using a non-homogeneous continuous time Markov chain. Softw. Qual. J. 12(3), 211\u2013230 (2004). https:\/\/doi.org\/10.1023\/b:sqjo.0000034709.63615.8b","journal-title":"Softw. Qual. J."},{"issue":"2\u20133","key":"288_CR15","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0166-5316(01)00034-7","volume":"45","author":"K Go\u0161eva-Popstojanova","year":"2001","unstructured":"Go\u0161eva-Popstojanova, K., Trivedi, K.S.: Architecture-based approach to reliability assessment of software systems. Perform. Eval. 45(2\u20133), 179\u2013204 (2001)","journal-title":"Perform. Eval."},{"issue":"4","key":"288_CR16","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.infsof.2003.07.002","volume":"46","author":"D Greer","year":"2004","unstructured":"Greer, D., Ruhe, G.: Software release planning: an evolutionary and iterative approach. Inf. Softw. Technol. 46(4), 243\u2013253 (2004). https:\/\/doi.org\/10.1016\/j.infsof.2003.07.002","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"288_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland, J.H.: Genetic algorithms. Sci. Am. 267(1), 66\u201372 (1992). https:\/\/doi.org\/10.1038\/scientificamerican0792-66","journal-title":"Sci. Am."},{"issue":"4","key":"288_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/tr.2005.859230","volume":"54","author":"CY Huang","year":"2005","unstructured":"Huang, C.Y., Lyu, M.: Optimal release time for software systems considering cost, testing-effort, and test efficiency. IEEE Trans. Reliab. 54(4), 583\u2013591 (2005). https:\/\/doi.org\/10.1109\/tr.2005.859230","journal-title":"IEEE Trans. Reliab."},{"issue":"3","key":"288_CR19","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/tse.2003.1183936","volume":"29","author":"CY Huang","year":"2003","unstructured":"Huang, C.Y., Lyu, M., Kuo, S.Y.: A unified scheme of some nonhomogenous poisson process models for software reliability estimation. IEEE Trans. Softw. Eng. 29(3), 261\u2013269 (2003). https:\/\/doi.org\/10.1109\/tse.2003.1183936","journal-title":"IEEE Trans. Softw. Eng."},{"key":"288_CR20","doi-asserted-by":"crossref","unstructured":"Jelinski, Z., Moranda, P.: Software reliability research. In: Statistical Computer Performance Evaluation, pp. 465\u2013484. Elsevier, Amsterdam (1972). https:\/\/doi.org\/10.1016\/b978-0-12-266950-7.50028-1","DOI":"10.1016\/B978-0-12-266950-7.50028-1"},{"key":"288_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.asoc.2015.11.041","volume":"40","author":"C Jin","year":"2016","unstructured":"Jin, C., Jin, S.W.: Parameter optimization of software reliability growth model with s-shaped testing-effort function using improved swarm intelligent optimization. Appl. Soft Comput. 40, 283\u2013291 (2016). https:\/\/doi.org\/10.1016\/j.asoc.2015.11.041","journal-title":"Appl. Soft Comput."},{"issue":"9","key":"288_CR23","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1080\/00207729108910731","volume":"22","author":"PK Kapur","year":"1991","unstructured":"Kapur, P.K., Garg, R.B.: Optimal release policies for software systems with testing effort. Int. J. Syst. Sci. 22(9), 1563\u20131571 (1991). https:\/\/doi.org\/10.1080\/00207729108910731","journal-title":"Int. J. Syst. Sci."},{"issue":"5","key":"288_CR22","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/0026-2714(95)00157-3","volume":"36","author":"P Kapur","year":"1996","unstructured":"Kapur, P., Younes, S.: Modelling an imperfect debugging phenomenon in software reliability. Microelectron. Reliab. 36(5), 645\u2013650 (1996)","journal-title":"Microelectron. Reliab."},{"issue":"3","key":"288_CR24","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/tr.2012.2207531","volume":"61","author":"PK Kapur","year":"2012","unstructured":"Kapur, P.K., Pham, H., Aggarwal, A.G., Kaur, G.: Two dimensional multi-release software reliability modeling and optimal release planning. IEEE Trans. Reliab. 61(3), 758\u2013768 (2012). https:\/\/doi.org\/10.1109\/tr.2012.2207531","journal-title":"IEEE Trans. Reliab."},{"key":"288_CR25","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of International Conference on Neural Networks ICNN\u201995. IEEE (1995). https:\/\/doi.org\/10.1109\/icnn.1995.488968","DOI":"10.1109\/ICNN.1995.488968"},{"key":"288_CR26","volume-title":"The Rational Unified Process: An Introduction","author":"P Kruchten","year":"2004","unstructured":"Kruchten, P.: The Rational Unified Process: An Introduction. Addison-Wesley Professional, Boston (2004)"},{"issue":"1","key":"288_CR27","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/02522667.2017.1380420","volume":"39","author":"S Kumar","year":"2017","unstructured":"Kumar, S., Ranjan, P.: A phase wise approach for fault identification. J. Inf. Optim. Sci. 39(1), 223\u2013237 (2017). https:\/\/doi.org\/10.1080\/02522667.2017.1380420","journal-title":"J. Inf. Optim. Sci."},{"key":"288_CR28","volume-title":"Agile and Iterative Development: A Manager\u2019s Guide","author":"C Larman","year":"2004","unstructured":"Larman, C.: Agile and Iterative Development: A Manager\u2019s Guide. Addison-Wesley Professional, Boston (2004)"},{"issue":"6","key":"288_CR29","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/mc.2003.1204375","volume":"36","author":"C Larman","year":"2003","unstructured":"Larman, C., Basili, V.: Iterative and incremental developments a brief history. Computer 36(6), 47\u201356 (2003). https:\/\/doi.org\/10.1109\/mc.2003.1204375","journal-title":"Computer"},{"issue":"3","key":"288_CR30","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/tr.1979.5220576","volume":"R-28","author":"B Littlewood","year":"1979","unstructured":"Littlewood, B.: Software reliability model for modular program structure. IEEE Trans. Reliab. R-28(3), 241\u2013246 (1979). https:\/\/doi.org\/10.1109\/tr.1979.5220576","journal-title":"IEEE Trans. Reliab."},{"issue":"2","key":"288_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1049\/sej.1987.0005","volume":"2","author":"B Littlewood","year":"1987","unstructured":"Littlewood, B., Sofer, A.: A Bayesian modification to the Jelinski\u2013Moranda software reliability growth model. Softw. Eng. J. 2(2), 30 (1987). https:\/\/doi.org\/10.1049\/sej.1987.0005","journal-title":"Softw. Eng. J."},{"key":"288_CR32","doi-asserted-by":"crossref","unstructured":"Luo, Z., Cao, P., Tang, G., Wu, L.: A modification to the Jelinski\u2013Moranda software reliability growth model based on cloud model theory. In: 2011 Seventh International Conference on Computational Intelligence and Security. IEEE (2011). https:\/\/doi.org\/10.1109\/cis.2011.51","DOI":"10.1109\/CIS.2011.51"},{"issue":"18","key":"288_CR56","doi-asserted-by":"publisher","first-page":"38","DOI":"10.5120\/7451-0534","volume":"48","author":"G Mahapatra","year":"2012","unstructured":"Mahapatra, G., Roy, P.: Modified Jelinski\u2013Moranda software reliability model with imperfect debugging phenomenon. Int. J. Comput. Appl. 48(18), 38\u201346 (2012). https:\/\/doi.org\/10.5120\/7451-0534","journal-title":"Int. J. Comput. Appl."},{"key":"288_CR33","doi-asserted-by":"crossref","unstructured":"McCall, J., Randall, W., Bowen, C., McKelvey, N., Senn, R.: Methodology for software reliability prediction, vol.2. Tech. rep. (1987). https:\/\/doi.org\/10.21236\/ada190019","DOI":"10.21236\/ADA190019"},{"key":"288_CR34","doi-asserted-by":"crossref","unstructured":"Mirjalili, S., Hashim, S.Z.M.: A new hybrid PSOGSA algorithm for function optimization. In: 2010 International Conference on Computer and Information Application. IEEE (2010). https:\/\/doi.org\/10.1109\/iccia.2010.6141614","DOI":"10.1109\/ICCIA.2010.6141614"},{"issue":"6","key":"288_CR35","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s00521-014-1629-6","volume":"25","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Wang, G.G., Coelho, L.D.S.: Binary optimization using hybrid particle swarm optimization and gravitational search algorithm. Neural Comput. Appl. 25(6), 1423\u20131435 (2014). https:\/\/doi.org\/10.1007\/s00521-014-1629-6","journal-title":"Neural Comput. Appl."},{"key":"288_CR36","unstructured":"Model, W.: Waterfall model. Luettavissa. 3 (2015). http:\/\/www.waterfall-model.com\/Luettu"},{"issue":"4","key":"288_CR37","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/tr.1981.5221096","volume":"R-30","author":"PB Moranda","year":"1981","unstructured":"Moranda, P.B.: An error detection model for application during software development. IEEE Trans. Reliab. R-30(4), 309\u2013312 (1981). https:\/\/doi.org\/10.1109\/tr.1981.5221096","journal-title":"IEEE Trans. Reliab."},{"key":"288_CR38","unstructured":"Musa, J.D., Okumoto, K.: A logarithmic poisson execution time model for software reliability measurement. In: Proceedings of the 7th International Conference on Software Engineering, pp. 230\u2013238. Citeseer (1984)"},{"issue":"1","key":"288_CR39","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/S0022-2496(02)00028-7","volume":"47","author":"IJ Myung","year":"2003","unstructured":"Myung, I.J.: Tutorial on maximum likelihood estimation. J. Math. Psychol. 47(1), 90\u2013100 (2003)","journal-title":"J. Math. Psychol."},{"key":"288_CR40","doi-asserted-by":"crossref","unstructured":"Ohba, M.: Inflection s-shaped software reliability growth model. In: Lecture Notes in Economics and Mathematical Systems, pp. 144\u2013162. Springer, Berlin (1984). https:\/\/doi.org\/10.1007\/978-3-642-45587-2_10","DOI":"10.1007\/978-3-642-45587-2_10"},{"issue":"6","key":"288_CR41","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/tse.2007.1015","volume":"33","author":"HM Olague","year":"2007","unstructured":"Olague, H.M., Etzkorn, L.H., Gholston, S., Quattlebaum, S.: Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. IEEE Trans. Softw. Eng. 33(6), 402\u2013419 (2007). https:\/\/doi.org\/10.1109\/tse.2007.1015","journal-title":"IEEE Trans. Softw. Eng."},{"key":"288_CR42","doi-asserted-by":"crossref","unstructured":"Ortiz, E.: Software-quality improvement using reliability-growth models. In: Annual Reliability and Maintainability Symposium 1995 Proceedings. IEEE (1995). https:\/\/doi.org\/10.1109\/rams.1995.513244","DOI":"10.1109\/RAMS.1995.513244"},{"issue":"4","key":"288_CR43","doi-asserted-by":"publisher","first-page":"555","DOI":"10.12732\/caa.v22i4.4","volume":"22","author":"N Pavlov","year":"2018","unstructured":"Pavlov, N., Iliev, A., Rahnev, A., Kyurkchiev, N.: Application of a new class cumulative lifetime distribution to software reliability analysis. Commun. Appl. Anal. 22(4), 555\u2013565 (2018). https:\/\/doi.org\/10.12732\/caa.v22i4.4","journal-title":"Commun. Appl. Anal."},{"key":"288_CR44","doi-asserted-by":"crossref","unstructured":"Pham, H.: Software reliability modeling. In: Springer Series in Reliability Engineering, pp. 153\u2013177. Springer, London (2006). https:\/\/doi.org\/10.1007\/1-84628-295-0_5","DOI":"10.1007\/1-84628-295-0_5"},{"key":"288_CR45","doi-asserted-by":"crossref","unstructured":"Rana, R., Staron, M., Berger, C., Hansson, J., Nilsson, M., Torner, F.: Comparing between maximum likelihood estimator and non-linear regression estimation procedures for NHPP software reliability growth modelling. In: 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement. IEEE (2013). https:\/\/doi.org\/10.1109\/iwsm-mensura.2013.37","DOI":"10.1109\/IWSM-Mensura.2013.37"},{"issue":"02","key":"288_CR46","doi-asserted-by":"publisher","first-page":"1450008","DOI":"10.1142\/s0218539314500089","volume":"21","author":"P Roy","year":"2014","unstructured":"Roy, P., Mahapatra, G.S., Dey, K.N.: AN NHPP software reliability growth model with imperfect debugging and error generation. Int. J. Reliab. Qual. Saf. Eng. 21(02), 1450008 (2014). https:\/\/doi.org\/10.1142\/s0218539314500089","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"issue":"6","key":"288_CR47","first-page":"1037","volume":"23","author":"Sangeeta","year":"2020","unstructured":"Sangeeta, Sitender: Comprehensive analysis of hybrid nature-inspired algorithms for software reliability analysis. J. Stat. Manag. Syst. 23(6), 1037\u20131048 (2020)","journal-title":"J. Stat. Manag. Syst."},{"key":"288_CR48","doi-asserted-by":"publisher","first-page":"5089","DOI":"10.1166\/jctn.2019.8568","volume":"16","author":"Sangeeta","year":"2019","unstructured":"Sangeeta, Sharma, K., et al.: A quantitative testing effort estimate for reliability assessment of multi release open source software systems. J. Comput. Theor. Nanosci. 16, 5089\u20135098 (2019)","journal-title":"J. Comput. Theor. Nanosci."},{"issue":"1","key":"288_CR49","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13198-019-00926-2","volume":"11","author":"Sangeeta","year":"2020","unstructured":"Sangeeta, Sharma, K., Bala, M.: An ecological space based hybrid swarm-evolutionary algorithm for software reliability model parameter estimation. Int. J. Syst. Assur. Eng. Manag. 11(1), 77\u201392 (2020a)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"288_CR50","unstructured":"Sangeeta, Sharma, K., Bala, M., et\u00a0al.: Reliability analysis and modeling of green computing based software systems. Recent Adv. Comput. Sci. Commun. https:\/\/www.researchgate.net\/publication\/338662632_Reliability_Analysis_and_Modeling_of_Green_Computing_Based_Software_Systems (2020b)"},{"issue":"2","key":"288_CR51","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/tse.1978.231481","volume":"SE-4","author":"G Schick","year":"1978","unstructured":"Schick, G., Wolverton, R.: An analysis of competing software reliability models. IEEE Trans. Softw. Eng. SE-4(2), 104\u2013120 (1978). https:\/\/doi.org\/10.1109\/tse.1978.231481","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"288_CR52","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/tr.2010.2048657","volume":"59","author":"K Sharma","year":"2010","unstructured":"Sharma, K., Garg, R., Nagpal, C.K., Garg, R.K.: Selection of optimal software reliability growth models using a distance based approach. IEEE Trans. Reliab. 59(2), 266\u2013276 (2010). https:\/\/doi.org\/10.1109\/tr.2010.2048657","journal-title":"IEEE Trans. Reliab."},{"key":"288_CR53","unstructured":"Sharma, K., Bala, M., et\u00a0al.: Magnetic navigation based optimizer: a new optimization algorithm for software reliability model parameter estimation. J. Adv. Res. Dyn. Control Syst. (14), 1957\u20131968 (2018)"},{"key":"288_CR54","doi-asserted-by":"crossref","unstructured":"Sheta, A.: Reliability growth modeling for software fault detection using particle swarm optimization. In: 2006 IEEE International Conference on Evolutionary Computation IEEE (2006). https:\/\/doi.org\/10.1109\/cec.2006.1688697","DOI":"10.1109\/CEC.2006.1688697"},{"issue":"12","key":"288_CR55","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/tse.2017.2766070","volume":"44","author":"V Singh","year":"2018","unstructured":"Singh, V., Sharma, M., Pham, H.: Entropy based software reliability analysis of multi-version open source software. IEEE Trans. Softw. Eng. 44(12), 1207\u20131223 (2018). https:\/\/doi.org\/10.1109\/tse.2017.2766070","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"288_CR57","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/24.740500","volume":"47","author":"C Smidts","year":"1998","unstructured":"Smidts, C., Stutzke, M., Stoddard, R.: Software reliability modeling: an approach to early reliability prediction. IEEE Trans. Reliab. 47(3), 268\u2013278 (1998)","journal-title":"IEEE Trans. Reliab."},{"key":"288_CR58","unstructured":"Tripathi, A.K., Sharma, K., Bala, M.: Military dog based optimizer and its application to fake review. arXiv preprint arXiv:190911890 (2019)"},{"issue":"2","key":"288_CR59","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5121\/ijsea.2016.7204","volume":"7","author":"LIA Turk","year":"2016","unstructured":"Turk, L.I.A., Alsolami, E.G.: Jelinski\u2013Moranda software reliablity growth model?: A brief literature and modification. Int. J. Softw. Eng. Appl. 7(2), 33\u201344 (2016). https:\/\/doi.org\/10.5121\/ijsea.2016.7204","journal-title":"Int. J. Softw. Eng. Appl."},{"issue":"5","key":"288_CR60","doi-asserted-by":"publisher","first-page":"e0122827","DOI":"10.1371\/journal.pone.0122827","volume":"10","author":"MNA Wahab","year":"2015","unstructured":"Wahab, M.N.A., Nefti-Meziani, S., Atyabi, A.: A comprehensive review of swarm optimization algorithms. PLOS ONE 10(5), e0122827 (2015). https:\/\/doi.org\/10.1371\/journal.pone.0122827","journal-title":"PLOS ONE"},{"key":"288_CR61","doi-asserted-by":"crossref","unstructured":"Wang, W.L., Wu, Y., Chen, M.H.: An architecture-based software reliability model. In: Proceedings: Pacific Rim International Symposium on Dependable Computing. IEEE Computer Society (1999). https:\/\/doi.org\/10.1109\/prdc.1999.816223","DOI":"10.1109\/PRDC.1999.816223"},{"key":"288_CR62","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.jss.2017.06.018","volume":"137","author":"X Wei","year":"2018","unstructured":"Wei, X., Dong, Y., Li, X., Wong, W.E.: Architecture-level hazard analysis using AADL. J. Syst. Softw. 137, 580\u2013604 (2018). https:\/\/doi.org\/10.1016\/j.jss.2017.06.018","journal-title":"J. Syst. Softw."},{"issue":"10","key":"288_CR63","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1109\/32.6196","volume":"14","author":"S Weiss","year":"1988","unstructured":"Weiss, S., Weyuker, E.: An extended domain-based model of software reliability. IEEE Trans. Softw. Eng. 14(10), 1512\u20131524 (1988). https:\/\/doi.org\/10.1109\/32.6196","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"8","key":"288_CR64","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/tse.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong, W.E., Gao, R., Li, Y., Abreu, R., Wotawa, F.: A survey on software fault localization. IEEE Trans. Softw. Eng. 42(8), 707\u2013740 (2016). https:\/\/doi.org\/10.1109\/tse.2016.2521368","journal-title":"IEEE Trans. Softw. Eng."},{"key":"288_CR65","doi-asserted-by":"crossref","unstructured":"Xavier, J., Mac\u00eado, A., Matias, R., Borges, L.: A survey on research in software reliability engineering in the last decade. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing. ACM Press (2014). https:\/\/doi.org\/10.1145\/2554850.2555161","DOI":"10.1145\/2554850.2555161"},{"issue":"1","key":"288_CR66","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/tr.2014.2363155","volume":"64","author":"J Xiang","year":"2015","unstructured":"Xiang, J., Machida, F., Tadano, K., Maeno, Y.: An imperfect fault coverage model with coverage of irrelevant components. IEEE Trans. Reliab. 64(1), 320\u2013332 (2015). https:\/\/doi.org\/10.1109\/tr.2014.2363155","journal-title":"IEEE Trans. Reliab."},{"key":"288_CR67","doi-asserted-by":"publisher","DOI":"10.1142\/1390","volume-title":"Software Reliability Modelling","author":"M Xie","year":"1991","unstructured":"Xie, M.: Software Reliability Modelling, vol. 1. World Scientific, Singapore (1991)"},{"issue":"5","key":"288_CR68","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/tr.1983.5221735","volume":"R-32","author":"S Yamada","year":"1983","unstructured":"Yamada, S., Ohba, M., Osaki, S.: S-shaped reliability growth modeling for software error detection. IEEE Trans. Reliab. R-32(5), 475\u2013484 (1983). https:\/\/doi.org\/10.1109\/tr.1983.5221735","journal-title":"IEEE Trans. Reliab."},{"issue":"1","key":"288_CR69","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/tr.1986.4335332","volume":"35","author":"S Yamada","year":"1986","unstructured":"Yamada, S., Ohtera, H., Narihisa, H.: Software reliability growth models with testing-effort. IEEE Trans. Reliab. 35(1), 19\u201323 (1986). https:\/\/doi.org\/10.1109\/tr.1986.4335332","journal-title":"IEEE Trans. Reliab."},{"issue":"1\u20132","key":"288_CR70","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/0898-1221(92)90231-6","volume":"24","author":"S Yamada","year":"1992","unstructured":"Yamada, S., Ohtera, H., Ohba, M.: Testing-domain dependent software reliability models. Comput. Math. Appl. 24(1\u20132), 79\u201386 (1992)","journal-title":"Comput. Math. Appl."},{"issue":"01","key":"288_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4172\/2324-9307.1000e101","volume":"01","author":"XS Yang","year":"2012","unstructured":"Yang, X.S.: Nature-inspired mateheuristic algorithms: success and new challenges. J. Comput. Eng. Inf. Technol. 01(01), 1\u20133 (2012). https:\/\/doi.org\/10.4172\/2324-9307.1000e101","journal-title":"J. Comput. Eng. Inf. Technol."},{"key":"288_CR72","doi-asserted-by":"crossref","unstructured":"Yang, X.S.: Bat algorithms. In: Nature-Inspired Optimization Algorithms, pp. 141\u2013154. Elsevier, Amsterdam (2014). https:\/\/doi.org\/10.1016\/b978-0-12-416743-8.00010-5","DOI":"10.1016\/B978-0-12-416743-8.00010-5"},{"issue":"1","key":"288_CR73","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/tsmca.2003.812597","volume":"33","author":"X Zhang","year":"2003","unstructured":"Zhang, X., Teng, X., Pham, H.: Considering fault removal efficiency in software reliability assessment. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 33(1), 114\u2013120 (2003). https:\/\/doi.org\/10.1109\/tsmca.2003.812597","journal-title":"IEEE Trans. Syst. Man Cybern. Part A Syst. Hum."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-021-00288-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-021-00288-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-021-00288-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T01:25:32Z","timestamp":1634952332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-021-00288-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,9]]},"references-count":73,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["288"],"URL":"https:\/\/doi.org\/10.1007\/s10515-021-00288-9","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2021,7,9]]},"assertion":[{"value":"10 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of the authors. This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"We give our consent for the publication of this article in your esteemed journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"9"}}