@dblp

Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.

, , , , and . CSIIRW, page 43. ACM, (2013)

Links and resources

Tags