共 50 条
- [33] Analysis of Ten Reverse Engineering Tools [J]. ADVANCES TECHNIQUES IN COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2010, : 389 - +
- [34] A comparison of four reverse engineering tools [J]. PROCEEDINGS OF THE FOURTH WORKING CONFERENCE ON REVERSE ENGINEERING, 1997, : 2 - 11
- [36] A system for generating reverse engineering tools [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE INCORPORATING COMPUTER AIDED SOFTWARE ENGINEERING, PROCEEDINGS, 1997, : 34 - 44
- [37] A Network Protocol Reverse Engineering Method Based on Dynamic Taint Propagation Similarity [J]. INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT I, 2016, 9771 : 580 - 592
- [38] Protocol vulnerability detection based on network traffic analysis and binary reverse engineering [J]. PLOS ONE, 2017, 12 (10):
- [39] KNOWLEDGE BASED ENGINEERING AND ONTOLOGY ENGINEERING APPROACHES FOR PRODUCT DEVELOPMENT: METHODS AND TOOLS FOR DESIGN AUTOMATION IN INDUSTRIAL ENGINEERING [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, 2016, VOL. 11, 2017,