First Page | Document Content | |
---|---|---|
Date: 2015-05-05 00:58:34Central Intelligence Agency Cold War in popular culture McLean Virginia Change impact analysis Program slicing Mining software repositories Reverse engineering Software engineering Computing Change | SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. ReliabPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: stvr.1475 A survey of code-based change impact analysis teAdd to Reading ListSource URL: zhang-sai.github.ioDownload Document from Source WebsiteFile Size: 2,80 MBShare Document on Facebook |
Reverse Engineering SPARQL Queries∗ Marcelo Arenas Gonzalo I. Diaz Egor V. KostylevDocID: 1xV2q - View Document | |
Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smartDocID: 1xUFF - View Document | |
Towards Reverse-Engineering Black-Box Neural Networks Seong Joon Oh Max Augustin Bernt SchieleDocID: 1vrq7 - View Document | |
Reverse-engineering Online Tracking From niche research field to easy-to-use tool Steven Englehardt webtap.princeton.eduDocID: 1vp8X - View Document | |
What is Reverse Engineering (RE)? Know your toolsDocID: 1viX9 - View Document |