[1] Ahlswede R., Haroutunian E. (2006). “On logarithmically asymptotically optimal testing of hypotheses and identification”, Lecture Notes in Computer Science, 4123, 553-571.
[2] Csiszár I. (1998). “Method of types”, IEEE Transactions on Information Theory, 44(6), 2505-2523.
[3] Csiszár I., Körner J. (1981). “Information theory: Coding theorem for discrete memoryless systems”, Academic Press, NewYork.
[4] Csiszár I., Shields P. (2004). “Information theory and statistics: A tutorial”, Fundamentals and Trends in Communications and Information Theory, 1(4).
[5] Dembo A., Zeitouni O. (1993). “Large deviations techniques and applications”, Jons and Bartlet. Publishers, London.
[6] Haroutunian E. A. (1988). “On asymptotically optimal testing of hypotheses concerning Markov chain”, (in Russian). Izvestia Acad. Nauk Armenian SSR. Seria Mathem., 22, 76-80.
[7] Haroutunian E. A., Grigorian N. (2007). “On reliability approach for testing distributions for pair of Markov chains”, Mathematical Problems of Computer Sciences, 29, 86-96.
[8] Haroutunian E. A., Haroutunian M. E., Harutyunyan A. N. (2007).“Reliability criteria in information theory and in statistical hypothesis testing”, Foundations and Trends in Communications and Information Theory, 4, 2-3.
[9] Haroutunian E. A., Navaei L. (2009). “On optimal identification of Markov chain distribution subject to the reliability criterian”, Mathematical Problems of Computer Science, 32, 65-69.
[10] Kullback S. (1959). “Information theory and statistics”, Wiley, New York.
[11] Natarajan S. (1985). “Large deviations, hypotheses testing, and source coding for finite Markov chain”, IEEE Transactions on Information Theory, 31(3), 360-365.
[12] Navaei L. (2007). “Large deviations techniques for error exponents to many hypotheses LAO testing”, Journal of Modern Applied Statistical Methods, USA, 6(3), 487-491.
[13] Navaei L. (2008). “Application of LDT to many hypotheses optimal testing for Markov chain”, Mathematical Problems of Computer Science, 31, 73-78.
[14] Navaei L., Dayanian R. (2008). “Hidden message via hypothesis testing and information-theoretic model”, Journal of Discrete Mathematical Sciences and Cryptography, 11(6), 737-746.