• ARACNE

  • Referenced in 35 articles [sw17200]
  • computational methods for the genome-wide ”reverse engineering” of such networks have been successful only ... problem that has challenged existing reverse engineering algorithms. This approach should enhance our ability...
  • REVEAL

  • Referenced in 28 articles [sw36999]
  • Reveal, a general reverse engineering algorithm for inference of genetic network architectures. Given the immanent ... state transition tables. We implemented this REVerse Engineering ALgorithm (REVEAL) in a C program...
  • Columbus

  • Referenced in 11 articles [sw09402]
  • Columbus - reverse engineering tool and schema for C++. One of the most critical issues ... this paper we present a reverse engineering framework called Columbus that is able to analyze ... versatile and readily extendible toolset for reverse engineering. This tool is free for scientific ... work related to C++ re- and reverse engineering...
  • Rhinoceros

  • Referenced in 15 articles [sw07518]
  • automotive design, CAD / CAM, rapid prototyping, reverse engineering, product design as well as the multimedia...
  • Fujaba

  • Referenced in 13 articles [sw04100]
  • thus offering an extensible plattform for software engineering researchers. The Fujaba Development Group is permanently ... aimed to support software forward and reverse engineering. That is why Fujaba is an acronym...
  • WebPlotDigitizer

  • Referenced in 12 articles [sw34522]
  • maps. It is often necessary to reverse engineer images of data visualizations to extract...
  • Shimba

  • Referenced in 6 articles [sw01242]
  • Shimba -- an environment for reverse engineering Java software systems Shimba is a reverse engineering environment ... directed graphs using the Rigi reverse engineering environment. The run-time information is generated ... among the views enables goal-driven reverse engineering tasks and aids the overall understanding ... illustrate and validate the Shimba reverse engineering environment...
  • BitBlaze

  • Referenced in 11 articles [sw10059]
  • malicious code defense, such as protocol reverse engineering and fingerprint generation. The BitBlaze project consists...
  • PyBrain

  • Referenced in 10 articles [sw12670]
  • with the name first and later reverse-engineered this quite descriptive ”Backronym...
  • GAZEBO

  • Referenced in 10 articles [sw21668]
  • simulation of remote environments, and even reverse engineering of blackbox systems are all possible applications...
  • Polynome

  • Referenced in 6 articles [sw12584]
  • used as a tool for reverse-engineering of Boolean network models from experimental time course...
  • NARROMI

  • Referenced in 6 articles [sw24066]
  • benchmark datasets from Dialogue for Reverse Engineering Assessments and Methods challenge and experimentally determined...
  • Maisa

  • Referenced in 3 articles [sw09403]
  • separate phases, analysis and reverse engineering of the C++ code, and architectural pattern matching over ... reverse-engineered intermediate code representation. It is shown how the pattern recognition effect ... integrating two specialized software tools, the reverse engineering framework Columbus and the architectural metrics analyzer...
  • Rigi

  • Referenced in 3 articles [sw16867]
  • Rigi—An environment for software reverse engineering, exploration, visualization, and redocumentation. The Rigi environment ... research tool that provides functionality to reverse engineer software systems. With Rigi large systems ... automate the process, and a visualization engine to interactively explore and manipulate information ... functionalities, and assess its impact on reverse engineering research. Furthermore, we discuss Rigi’s architecture...
  • OKVAR-Boost

  • Referenced in 3 articles [sw24063]
  • interactions in gene regulatory networks. MOTIVATION: Reverse engineering of gene regulatory networks remains a central ... datasets related to the In vivo Reverse-Engineering and Modeling Assessment (IRMA) and T-cell...
  • LIFT

  • Referenced in 2 articles [sw30262]
  • point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become ... article, based on a survey about reverse engineering tools, discusses a set of functional ... requirements for an effective tool for reverse engineering, and observes that current tools only partly ... applied the LIFT in a reverse engineering project of a 210KLOC NATURAL/ADABAS system...
  • JConstHide

  • Referenced in 2 articles [sw20347]
  • approach to defeat the practice of reverse engineering a software for using its functionality illegally ... Java applications are more amenable to reverse engineering and re-engineering attacks through methods such ... program makes it more resilient to reverse engineering attacks . But source code obfuscation is much ... java source codes, to defeat reverse engineering through decompilation. To the best of our knowledge...
  • VMAttack

  • Referenced in 2 articles [sw31766]
  • such, integrates seamlessly with manual reverse engineering. The complexity of the disassembly view is notably ... dynamic analysis’s results, provides the reverse engineer with a deobfuscated disassembly that tolerates weaknesses...
  • jPET

  • Referenced in 3 articles [sw12788]
  • Java program. jPET performs reverse engineering of the test-cases obtained at the byte code...
  • KELLER

  • Referenced in 3 articles [sw22600]
  • reweighted logistic regression method (KELLER) for reverse engineering the dynamic interactions between genes based...