Reverse engineering software

被引:0
|
作者
不详
机构
来源
关键词
CADCAM; Delcam; reverse engineering; software;
D O I
暂无
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
引用
收藏
页码:391 / 392
页数:2
相关论文
共 50 条
  • [31] The legal status of reverse engineering of computer software
    Cifuentes, C
    Fitzgerald, A
    ANNALS OF SOFTWARE ENGINEERING, 2000, 9 (1-4) : 337 - 351
  • [32] Aspect-oriented software reverse engineering
    苏旸
    李凡
    胡圣明
    陈平
    Journal of Shanghai University, 2006, (05) : 402 - 408
  • [33] SOFTWARE REVERSE ENGINEERING - A CASE-STUDY
    BYRNE, EJ
    SOFTWARE-PRACTICE & EXPERIENCE, 1991, 21 (12): : 1349 - 1364
  • [34] Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C
    Lee, Jaehyuk
    Yim, Kangbin
    Lee, Kyungroul
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2021, 2022, 279 : 59 - 66
  • [35] REVERSE-ENGINEERING SOMEONE ELSES SOFTWARE - IS IT LEGAL
    SAMUELSON, P
    IEEE SOFTWARE, 1990, 7 (01) : 90 - 96
  • [36] Software reverse engineering based on crosscutting concerns recovery
    Software Engineering Inst., Xidian Univ., Xi'an 710071, China
    Xi Tong Cheng Yu Dian Zi Ji Shu/Syst Eng Electron, 2006, 9 (1415-1419+1429):
  • [37] Software reverse engineering and development: the VST TCS case
    Schipani, P
    Brescia, M
    Mancini, D
    Marty, L
    Spirito, G
    ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XIII, 2004, 314 : 697 - 700
  • [38] Reverse engineering the process of small novice software teams
    Liu, Y
    Stroulia, E
    10TH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2003, : 102 - 112
  • [39] A practical GLR parser generator for software reverse engineering
    Geng, Teng
    Xu, Fu
    Mei, Han
    Meng, Wei
    Chen, Zhibo
    Lai, Changqing
    Xu, F. (xufu@buaa.edu.cn), 1600, Academy Publisher (09): : 769 - 776
  • [40] Research and Implementation of a Reverse Engineering Method for Software Reuse
    Wang, Lan
    Jie, Anquan
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 311 - 314