Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/csiirw/LingerPPSA13
%A Linger, Richard C.
%A Pleszkoch, Mark G.
%A Prowell, Stacy J.
%A Sayre, Kirk
%A Ankrum, T. Scott
%B CSIIRW
%D 2013
%E Sheldon, Frederick T.
%E Giani, Annarita
%E Krings, Axel W.
%E Abercrombie, Robert K.
%I ACM
%K dblp
%P 43
%T Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.
%U http://dblp.uni-trier.de/db/conf/csiirw/csiirw2013.html#LingerPPSA13
%@ 978-1-4503-1687-3
@inproceedings{conf/csiirw/LingerPPSA13,
added-at = {2024-05-07T00:00:00.000+0200},
author = {Linger, Richard C. and Pleszkoch, Mark G. and Prowell, Stacy J. and Sayre, Kirk and Ankrum, T. Scott},
biburl = {https://www.bibsonomy.org/bibtex/2c6c2374de5cb4250137ec43111a14bb0/dblp},
booktitle = {CSIIRW},
crossref = {conf/csiirw/2013},
editor = {Sheldon, Frederick T. and Giani, Annarita and Krings, Axel W. and Abercrombie, Robert K.},
ee = {https://doi.org/10.1145/2459976.2460025},
interhash = {63fcba88abd60add54c7f74faf3c6fb4},
intrahash = {c6c2374de5cb4250137ec43111a14bb0},
isbn = {978-1-4503-1687-3},
keywords = {dblp},
pages = 43,
publisher = {ACM},
timestamp = {2024-05-13T10:18:02.000+0200},
title = {Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.},
url = {http://dblp.uni-trier.de/db/conf/csiirw/csiirw2013.html#LingerPPSA13},
year = 2013
}