共 50 条
- [32] Reverse-engineering a detector with false alarms [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
- [33] A reverse-engineering methodology for medical enhancement processes [J]. CENTERIS2019--INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/PROJMAN2019--INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/HCIST2019--INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, 164 : 714 - 723
- [34] Reverse-Engineering a Watermark Detector Using an Oracle [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2007, (01):
- [35] REVERSE-ENGINEERING SOMEONE ELSES SOFTWARE - IS IT LEGAL [J]. IEEE SOFTWARE, 1990, 7 (01) : 90 - 96
- [37] Legacy software reverse-engineering and comprehension by interpretations [J]. Proceedings of the 10th IASTED International Conference on Software Engineering and Applications, 2006, : 276 - 281
- [38] Reverse-Engineering BitTorrent: A Markov Approximation Perspective [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2996 - 3000
- [40] Reverse-Engineering the Physical Configuration of Smart Homes [J]. 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1763 - 1770