{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:24:28Z","timestamp":1758248668148,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647909","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Using SVM Classification and Reverse Engineering to Generate Trustworthy Code in Software Development"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2503-6009","authenticated-orcid":false,"given":"Tejbir","family":"Singh","sequence":"first","affiliation":[{"name":"MMICT&amp;BM, MMDU, Mullana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2899-6199","authenticated-orcid":false,"given":"Ravi Kumar","family":"Sharma","sequence":"additional","affiliation":[{"name":"MMICTBM, MM(DU), Mullana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-1606","authenticated-orcid":false,"given":"Dalip","family":"Kamboj","sequence":"additional","affiliation":[{"name":"MMICTBM, MM(DU), Mullana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3696-0025","authenticated-orcid":false,"given":"Parul","family":"Gandhi","sequence":"additional","affiliation":[{"name":"Faculty of Computer applications, Mriirs, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5101-2172","authenticated-orcid":false,"given":"Divyanshi","family":"Bhatia","sequence":"additional","affiliation":[{"name":"Faculty of Computer applications, DTU, delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1524\/itit.2012.0664"},{"key":"e_1_3_2_1_2_1","volume-title":"In\u00a02023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\u00a0(pp. 432-441)","author":"R.","year":"2023","unstructured":"Kumar, R. (2023, March). An Enhanced Framework for Data Protection in Cloud Environment using ECL-GWO Technique. In\u00a02023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA)\u00a0(pp. 432-441).IEEE."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49019-9_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Singh T. Vaid R. & Sharma A. (2022 July). Security Issues in Blockchain Integrated WSN: Challenges and Concerns. In\u00a02022 International Conference on Innovative Computing Intelligent Communication and Smart Electrical Systems (ICSES)\u00a0(pp. 1-5).IEEE.","DOI":"10.1109\/ICSES55317.2022.9914006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2294918"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2332291"},{"key":"e_1_3_2_1_7_1","first-page":"578","volume-title":"In\u00a02022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON)\u00a0(Vol. 1","author":"R.","year":"2022","unstructured":"Kumar, R. (2022, May). Security Enabled Framework to Access Information in Cloud Environment. In\u00a02022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON)\u00a0(Vol. 1, pp. 578-582).IEEE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601067"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2008.13TT"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.gde.2005.02.007"},{"key":"e_1_3_2_1_11_1","volume-title":"Software Product Lines: Practices and Patterns","author":"Clements P.","year":"2001","unstructured":"P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. Addison-Wesley, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1"},{"key":"e_1_3_2_1_13_1","volume-title":"USA","author":"Liaskos S.","year":"2006","unstructured":"S. Liaskos On goal-based variability acquisition and analysis. In Int'l ReqsEngConf, pages 76\u201385, Minneapolis, USA, September 2006."},{"key":"e_1_3_2_1_14_1","unstructured":"Dar M. Y. & Singh T. Thp: Triple Heterogeneous Protocol For Energy Efficient With Bwsn."},{"volume-title":"2008 16th IEEE International Requirements Engineering Conference","year":"2008","key":"e_1_3_2_1_15_1","unstructured":"NanNiu, Steve Easterbrook, \"Extracting and Modeling Product Line Functional Requirements,\" re, pp.155-164, 2008 16th IEEE International Requirements Engineering Conference, 2008"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/cce:20030108"},{"key":"e_1_3_2_1_17_1","volume-title":"Embedded Systems Dilemma of Chip Memory Diversity by Scratchpad Memory for Cache On-chip Memory.\u00a0International Journal of Engineering, Pure and Applied Sciences,\u00a01(1), 1-4","author":"R.","year":"2016","unstructured":"Sharma, R. (2016). Embedded Systems Dilemma of Chip Memory Diversity by Scratchpad Memory for Cache On-chip Memory.\u00a0International Journal of Engineering, Pure and Applied Sciences,\u00a01(1), 1-4."},{"key":"e_1_3_2_1_18_1","first-page":"431","volume-title":"Kyoto","year":"2013","unstructured":"Xiao Hong Chen, Ronghua, Haiying Sun and Hong Lu Deriving Requirements Specification With Time: A Software Environment Ontology based Approach Computer Software and Applications Conference (COMPSAC), Kyoto, pp 431- 436, 2013."},{"key":"e_1_3_2_1_19_1","first-page":"45","volume-title":"International Journal of Engineering & Technology, v.6, n.2","year":"2017","unstructured":"Sharma, R.K.; Ghandi, P (2017). Estimate Reliability of Component Based Software System Using Modified Neuro Fuzzy Model. International Journal of Engineering & Technology, v.6, n.2, pp. 45-49."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869376"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28244-0_8"},{"key":"e_1_3_2_1_22_1","volume-title":"In\u00a02016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)\u00a0(pp. 3850-3854)","author":"Gandhi R. K.","year":"2016","unstructured":"R. K., & Gandhi, P. (2016). Quality assurance of component based software systems. In\u00a02016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)\u00a0(pp. 3850-3854).IEEE."},{"key":"e_1_3_2_1_23_1","volume-title":"Reliability Estimation and Optimization: A Neuro Fuzzy Based Approach.\u00a0International Journal of Computer Science and Information Security (IJCSIS),\u00a016(12)","author":"Ghandi R. K.","year":"2018","unstructured":"Sharma, R. K., & Ghandi, P. (2018). Reliability Estimation and Optimization: A Neuro Fuzzy Based Approach.\u00a0International Journal of Computer Science and Information Security (IJCSIS),\u00a016(12)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30541-5_38"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:26:41Z","timestamp":1758216401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":24,"alternative-id":["10.1145\/3647444.3647909","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647909","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}