{"id":"https://openalex.org/W3028318756","doi":"https://doi.org/10.1109/mitp.2019.2944110","title":"Practical Aspects of Employing Antireverse Engineering","display_name":"Practical Aspects of Employing Antireverse Engineering","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3028318756","doi":"https://doi.org/10.1109/mitp.2019.2944110","mag":"3028318756"},"language":"en","primary_location":{"id":"doi:10.1109/mitp.2019.2944110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2019.2944110","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057042972","display_name":"James Bret Michael","orcid":"https://orcid.org/0000-0003-3777-9858"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James Bret Michael","raw_affiliation_strings":["Naval Postgraduate School"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School","institution_ids":["https://openalex.org/I35364215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5057042972"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06228223,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"3","first_page":"11","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7905197143554688},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6897908449172974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6106618642807007},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5559052228927612},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5217231512069702},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4929020404815674},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.468528687953949},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.44037479162216187},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.4269621968269348},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24260565638542175},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.22715944051742554},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10789576172828674}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7905197143554688},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6897908449172974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6106618642807007},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5559052228927612},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5217231512069702},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4929020404815674},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.468528687953949},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.44037479162216187},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.4269621968269348},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24260565638542175},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22715944051742554},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10789576172828674},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mitp.2019.2944110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2019.2944110","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5699999928474426,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1975607764","https://openalex.org/W2103408915","https://openalex.org/W2111301023","https://openalex.org/W2532550198","https://openalex.org/W2615608606","https://openalex.org/W2752483262","https://openalex.org/W2909521345","https://openalex.org/W2919561762","https://openalex.org/W6738158276"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4285005718"],"abstract_inverted_index":{"A":[0],"tension":[1],"exists":[2],"between":[3],"transparency":[4],"and":[5],"protecting":[6],"the":[7,10,19,33,45,52,58,77,90,102,115,120],"confidentiality":[8],"of":[9,13,18,32,68,76,112,117],"inner":[11],"workings":[12],"electronic":[14,20,53,78,103],"systems.":[15],"The":[16],"acquirer":[17,46,91],"system":[21,54,104,121],"may":[22,47,92],"desire":[23],"or":[24,83],"be":[25,93,106],"required":[26,94],"to":[27,40,49,99],"perform":[28],"its":[29],"own":[30],"assurance":[31],"system\u2019s":[34,79],"fitness":[35],"for":[36,122],"use,":[37,113],"requiring":[38],"access":[39],"those":[41],"innards.":[42],"For":[43],"example,":[44,89],"need":[48],"ensure":[50],"that":[51],"is":[55],"interoperable":[56],"with":[57],"acquirer\u2019s":[59],"other":[60],"systems":[61],"(e.g.,":[62],"semantic":[63],"interoperability":[64],"among":[65],"heterogeneous":[66],"Internet":[67],"Things":[69],"devices).":[70],"This":[71],"might":[72],"require":[73],"detailed":[74],"knowledge":[75],"application":[80],"programming":[81],"interfaces":[82],"system-specific":[84],"network":[85],"protocols.":[86],"As":[87],"another":[88],"by":[95],"a":[96],"regulatory":[97],"authority":[98],"determine":[100],"whether":[101],"can":[105],"used":[107],"safely":[108],"in":[109,124],"particular":[110],"context":[111],"necessitating":[114],"collection":[116],"information":[118],"about":[119],"use":[123],"hazard":[125],"analyses.":[126]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
