[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/csiirw/LingerPPSA13>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Kirk_Sayre>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Mark_G._Pleszkoch>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Richard_C._Linger>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Stacy_J._Prowell>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/T._Scott_Ankrum>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1145%2F2459976.2460025>
foaf:homepage <https://doi.org/10.1145/2459976.2460025>
dc:identifier DBLP conf/csiirw/LingerPPSA13 (xsd:string)
dc:identifier DOI doi.org%2F10.1145%2F2459976.2460025 (xsd:string)
dcterms:issued 2013 (xsd:gYear)
rdfs:label Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Kirk_Sayre>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Mark_G._Pleszkoch>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Richard_C._Linger>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Stacy_J._Prowell>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/T._Scott_Ankrum>
swrc:pages 43 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/csiirw/2013>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/csiirw/LingerPPSA13/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/csiirw/LingerPPSA13>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/csiirw/csiirw2013.html#LingerPPSA13>
rdfs:seeAlso <https://doi.org/10.1145/2459976.2460025>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/csiirw>
dc:title Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document