共 50 条
- [31] An Evaluation of Methods to Port Legacy Code to SGX Enclaves PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 1077 - 1088
- [32] CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
- [33] Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems MALWARE DETECTION, 2007, : 253 - +
- [35] Integration of Static and Dynamic Code Analysis for Understanding Legacy Source Code 32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), 2016, : 543 - 552
- [36] Transforming Legacy Systems into User-Centred Web Applications MANAGEMENT OF THE INTERCONNECTED WORLD, 2010, : 395 - 401
- [37] Transforming legacy network systems for use in the army future force MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1179 - 1185
- [38] RGRecSys: A Toolkit for Robustness Evaluation of Recommender Systems WSDM'22: PROCEEDINGS OF THE FIFTEENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2022, : 1597 - 1600
- [40] Conqueror Tamper-Proof Code Execution on Legacy Systems DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 21 - +