Kang, Xin, and Yong dong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks." Computer Networks 72 (2014): 62-73.
 Hendrikx, Ferry, Kris Bubendorfer, and Ryan Chard. "Reputation systems: A survey and taxonomy." Journal of Parallel and Distributed Computing 75 (2015): 184-197.
 England, Philip, et al. "A Survey of Trust Management in Mobile Ad-Hoc Networks." Proceedings of the 13th annual post graduate symposium on the convergence of telecommunications, networking, and broadcasting, PGNET. 2012.
 Qi, Xiaoguang, et al. "A complex network model based on the Gnutella protocol." Physica A: Statistical Mechanics and its Applications 388.18 (2009): 3955-3960.
 Fan, Xinxin, et al. "Behavior-based reputation management in P2P file-sharing networks." Journal of Computer and System Sciences 78.6 (2012): 1737-1750.
 Zhou, Runfang, Kai Hwang, and Min Cai. "Gossiptrust for fast reputation aggregation in peer-to-peer networks." Knowledge and Data Engineering, IEEE Transactions on 20.9 (2008): 1282-1295.
 Sattarivand, Mahdi, Reza Ebrahimi Atani, and Yashar Fekri Sustani. "Anew METHOD FOR SECURITY IN PEER TO PEER NETWORK USING MODIFIED PARTICLE SWARM ALGORITHM." Chemical and Process Engineering )2014(, 435-441.
 Bazmara, Mohammad, Shahram Jafari, and Fatemeh Pasand. "A Fuzzy expert system for goalkeeper quality recognition." arXiv preprint arXiv:1309.6433 (2013).
 Mohammad Bazmara,"A Novel Fuzzy Approach for Determining Best Position of Soccer Players", IJISA, vol.6, no.9, pp.62-67, 2014. DOI: 10.5815/ijisa.2014.09.08
 Mohammadi, Fereshteh, and Mohammad Bazmara. "A New Approach of Fuzzy Theory with Uncertainties in Geographic Information Systems." International Journal of Mechatronics, Electrical and Computer Technology 3.6 (2013): 1001-1014.
 M. Bazmara, S. Vahedian and S. Ramadhani, “KNN Algorithm for Consulting Behavioral Disorders in Children,” Journal of Basic and Applied Scientific Research, 3(12) 2013, pp. 981-986
 Pal, Sankar K. "Computational theory perception (CTP), rough-fuzzy uncertainty analysis and mining in bioinformatics and web intelligence: a unified framework." Transactions on Rough Sets XI. Springer Berlin Heidelberg, 2010. 106-129.
 Fereshteh Mohammadi, Mohammad bazmara, Hatef Pouryekta,"A New Hybrid Method for Risk Management in Expert Systems", IJISA, vol.6, no.7, pp.60-65, 2014. DOI: 10.5815/ijisa.2014.07.08
 Koza, John R. "Survey of genetic algorithms and genetic programming." Wescon Conference Record. WESTERN PERIODICALS COMPANY, 1995.
 Hall, Mark A. Correlation-based feature selection for machine learning. Diss. The University of Waikato, 1999.
 Wang, Li. "SoFA: An expert-driven, self-organization peer-to-peer semantic communities for network resource management." Expert Systems with Applications 38.1 (2011): 94-105.
 Cramer, Nichael Lynn. "A representation for the adaptive generation of simple sequential programs."Proceedings of the First International Conference on Genetic Algorithms. 1985.
 Dellarocas, Chrysanthos. "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior." Proceedings of the 2nd ACM conference on Electronic commerce. ACM, 2000.