<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0123-3033</journal-id>
<journal-title><![CDATA[Ingeniería y competitividad]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. compet.]]></abbrev-journal-title>
<issn>0123-3033</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad del Valle]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0123-30332024000100021</article-id>
<article-id pub-id-type="doi">10.25100/iyc.v26i1.12840</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Applied Reverse Engineering in Context]]></article-title>
<article-title xml:lang="es"><![CDATA[Ingeniería inversa aplicada en función del context]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[Martín E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pinzger]]></surname>
<given-names><![CDATA[Martin]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Arciniegas]]></surname>
<given-names><![CDATA[José L.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Cartagena  ]]></institution>
<addr-line><![CDATA[Cartagena ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Alpen-Adria-Universität  ]]></institution>
<addr-line><![CDATA[Klagenfurt ]]></addr-line>
<country>Austria</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad del Cauca Departamento de Telemática ]]></institution>
<addr-line><![CDATA[Popayán ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>04</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>04</month>
<year>2024</year>
</pub-date>
<volume>26</volume>
<numero>1</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0123-30332024000100021&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0123-30332024000100021&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0123-30332024000100021&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Reverse engineering is applied in multiple contexts. Each context is defined by a group of stakeholders, a set of resources and situations within a specific scope. There are diverse approaches for reverse engineering, however, all they assume that it is done in the context of software production. The aim of this work is to define an approach to recover the design of software products in different contexts. A comparative analysis of reverse engineering approaches was made using the pattern matching technique. To validate obtained results, a case study was carried out in two distinct contexts, the first in an education context to support a teaching-learning process and the second in a software production context to retrieve a software product design. A framework was defined, which includes a descriptive conceptual system and a set of instrumental elements of operational type, which serves to guide the software product design recovery process, based on the context in which this activity is carried out. It is concluded that the defined framework offers a new approach to software design recovery, because it involves the context where the process takes place and hides its complexity from non-expert stakeholders in reverse engineering.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen La ingeniería inversa se realiza en múltiples contextos. Cada contexto está definido por un grupo de participantes, un conjunto de recursos y situaciones que se encuentran dentro de un ámbito específico. Existen múltiples propuestas para realizar ingeniería inversa, sin embargo, todas asumen que se hace en el contexto de la producción de software. El objetivo de este trabajo es proponer un referente para recuperar el diseño de productos software, que pueda ser utilizado en diferentes contextos. Se hizo un análisis comparativo de los enfoques de ingeniería inversa utilizando la técnica de coincidencia de patrones. Para validar los resultados obtenidos se realizó un estudio de caso en dos contextos diferentes, el primero en un contexto de educación para apoyar un proceso de enseñanza aprendizaje y el segundo en un contexto de producción para recuperar el diseño de un producto software. Se definió un marco de referencia conformado por un sistema conceptual descriptivo y un conjunto de elementos instrumentales de tipo operativo, que guía el proceso de recuperación del diseño de productos software, ajustándose a las características del contexto en el que se realiza esta actividad. Se concluye que el marco de referencia definido, ofrece un nuevo enfoque para la recuperación del diseño de productos software, porque involucra el contexto en el que se realiza el proceso y oculta su complejidad a los participantes que no son expertos en ingeniería inversa.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Design recovery]]></kwd>
<kwd lng="en"><![CDATA[Education]]></kwd>
<kwd lng="en"><![CDATA[Framework]]></kwd>
<kwd lng="en"><![CDATA[Reverse engineering]]></kwd>
<kwd lng="en"><![CDATA[Software production]]></kwd>
<kwd lng="es"><![CDATA[Educación]]></kwd>
<kwd lng="es"><![CDATA[Ingeniería inversa]]></kwd>
<kwd lng="es"><![CDATA[Marco de referencia]]></kwd>
<kwd lng="es"><![CDATA[Producción de software]]></kwd>
<kwd lng="es"><![CDATA[Recuperación del diseño]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arasteh]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Sadegi]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Arasteh]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bölen Software module clustering method using the combination of shuffled frog leaping and genetic algorithm]]></article-title>
<source><![CDATA[Data Technologies and Applications]]></source>
<year>2021</year>
<volume>55</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>251-79</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shatnawi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Seriai]]></surname>
<given-names><![CDATA[AD]]></given-names>
</name>
<name>
<surname><![CDATA[Sahraoui]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reverse engineering reusable software components from object-oriented APIs]]></article-title>
<source><![CDATA[J Syst Softw]]></source>
<year>2017</year>
<volume>131</volume>
<page-range>442-60</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fontan]]></surname>
<given-names><![CDATA[FA]]></given-names>
</name>
<name>
<surname><![CDATA[Mäntylä]]></surname>
<given-names><![CDATA[MV]]></given-names>
</name>
<name>
<surname><![CDATA[Zanoni]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparing and experimenting machine learning techniques for code smell detection]]></article-title>
<source><![CDATA[Empir Softw Eng]]></source>
<year>2016</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1143-91</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ivkovic]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Medvidovic]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative analysis of software architecture recovery techniques]]></source>
<year>2014</year>
<conf-name><![CDATA[ 28th IEEE/ACM Int Conf on Automated Software Engineering (ASE'13)]]></conf-name>
<conf-loc>Clayton, Australia </conf-loc>
<page-range>486-96</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bruneliere]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Cabot]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Dupé]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Madiot]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modisco A model driven reverse engineering framework]]></article-title>
<source><![CDATA[Information and Software Technology]]></source>
<year>2014</year>
<volume>56</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1012-32</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moser]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Pichler]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[eknows: Platform for Multi-Language Reverse Engineering and Documentation Generation]]></source>
<year>2021</year>
<conf-name><![CDATA[ IEEE International Conference on Software Maintenance and Evolution (ICSME)]]></conf-name>
<conf-date>2021</conf-date>
<conf-loc>Luxembourg </conf-loc>
<page-range>559-68</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghaleb]]></surname>
<given-names><![CDATA[TA]]></given-names>
</name>
<name>
<surname><![CDATA[Aljasser]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Alturki]]></surname>
<given-names><![CDATA[MA]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhanced Visualization of Method Invocations by Extending Reverse-engineered Sequence Diagrams]]></source>
<year>2020</year>
<conf-name><![CDATA[ Working Conference on Software Visualization (VISSOFT)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc>Adelaide, SA, Australia </conf-loc>
<page-range>49-60</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sabir]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
<name>
<surname><![CDATA[Azam]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Haq]]></surname>
<given-names><![CDATA[SU]]></given-names>
</name>
<name>
<surname><![CDATA[Anwar]]></surname>
<given-names><![CDATA[MW]]></given-names>
</name>
<name>
<surname><![CDATA[Butt]]></surname>
<given-names><![CDATA[WH]]></given-names>
</name>
<name>
<surname><![CDATA[Amjad]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Model Driven Reverse Engineering Framework for Generating High Level UML Models From Java Source Code in IEEE]]></article-title>
<source><![CDATA[Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>158931-50</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<collab>Sparx Systems</collab>
<source><![CDATA[Architect. User Guide Series]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="">
<collab>Imagix Corp</collab>
<source><![CDATA[Imagix 4D]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stormer]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Software quality attribute analysis by architecture reconstruction (squa3re)]]></source>
<year>2007</year>
<conf-name><![CDATA[ 11th European Conference on Software Maintenance and Reengineering (CSMR'07)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>361-4</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tamburri]]></surname>
<given-names><![CDATA[DA]]></given-names>
</name>
<name>
<surname><![CDATA[Kazman]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[General methods for software architecture recovery a potential approach and its evaluation]]></article-title>
<source><![CDATA[Empirical Software Engineering]]></source>
<year>2018</year>
<volume>23</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1457-89</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kerdoudi]]></surname>
<given-names><![CDATA[ML]]></given-names>
</name>
<name>
<surname><![CDATA[Ziadi]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Tibermacine]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Sadou]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Recovering Software Architecture Product Lines]]></source>
<year>2019</year>
<conf-name><![CDATA[ 24th International Conference on Engineering of Complex Computer Systems (ICECCS)]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc>Guangzhou, China </conf-loc>
<page-range>226-35</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Wassif]]></surname>
<given-names><![CDATA[KT]]></given-names>
</name>
<name>
<surname><![CDATA[Makady]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Context-Aware Expert for Software Architecture Recovery (CAESAR) An automated approach for recovering software architectures]]></article-title>
<source><![CDATA[Journal of King Saud University-Computer and Information Sciences]]></source>
<year>2023</year>
<volume>35</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>101-6</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt Laser]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Medvidovic]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[DM]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[ARCADE: an extensible workbench for architecture recovery, change, and decay evaluation]]></source>
<year>2020</year>
<conf-name><![CDATA[ Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1546-50</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guamán]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Diaz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Cuesta]]></surname>
<given-names><![CDATA[CE]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a reference process for software architecture reconstruction]]></article-title>
<source><![CDATA[IET Software]]></source>
<year>2020</year>
<volume>14</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>592-606</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Favre]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
</person-group>
<source><![CDATA[Cacophony: Metamodel-driven software architecture reconstruction]]></source>
<year>2004</year>
<conf-name><![CDATA[ 11th Working Conference on Reverse Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>204-13</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Deursen]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hofmeister]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Koschke]]></surname>
<given-names><![CDATA[CR]]></given-names>
</name>
<name>
<surname><![CDATA[Moonen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Riva]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Symphony: View-driven software architecture reconstruction. Proceedings]]></source>
<year>2004</year>
<conf-name><![CDATA[ Proceedings Fourth Working IEEE/IFIP Conference on Software Architecture]]></conf-name>
<conf-loc> </conf-loc>
<page-range>122-32</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tilley]]></surname>
<given-names><![CDATA[SR]]></given-names>
</name>
<name>
<surname><![CDATA[Santanu]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[DB]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards a framework for program understanding, WPC&amp;apos;96]]></source>
<year>1996</year>
<conf-name><![CDATA[ 4th Workshop on Program Comprehension]]></conf-name>
<conf-loc> </conf-loc>
<page-range>19-28</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Granchelli]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Cardarelli]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Di Francesco]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Malavolta]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Iovino]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Di Salle]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards recovering the software architecture of microservice-based systems]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Software Architecture Workshops (ICSAW)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>46-53</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[ME]]></given-names>
</name>
<name>
<surname><![CDATA[Arciniegas]]></surname>
<given-names><![CDATA[JL]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recuperación de Arquitecturas de Software Un Mapeo Sistemático de la Literatura]]></article-title>
<source><![CDATA[Información Tecnológica]]></source>
<year>2016</year>
<volume>27</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>201-20</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Research Review of Design Pattern Mining]]></source>
<year>2020</year>
<conf-name><![CDATA[ 11th International Conference on Software Engineering and Service Science (ICSESS)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc>Beijing, China </conf-loc>
<page-range>339-42</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[ME]]></given-names>
</name>
<name>
<surname><![CDATA[Arciniegas]]></surname>
<given-names><![CDATA[JL]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Caracterización de contextos de uso de la ingeniería inversa]]></article-title>
<source><![CDATA[Información Tecnológica]]></source>
<year>2017</year>
<volume>28</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>75-84</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<collab>IEEE/ISO/IEC</collab>
<source><![CDATA[International Standard for Software, systems and enterprise--Architecture description]]></source>
<year>2022</year>
<publisher-loc><![CDATA[Ginebra, Suiza ]]></publisher-loc>
<publisher-name><![CDATA[International Organization for Standardization]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Di Federico]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Fezzardi]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Agosta]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Carnahan Conference on Security Technology (ICCST)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc>Montreal, QC, Canada </conf-loc>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[ME]]></given-names>
</name>
<name>
<surname><![CDATA[Chanchí]]></surname>
<given-names><![CDATA[GE]]></given-names>
</name>
<name>
<surname><![CDATA[Ospina]]></surname>
<given-names><![CDATA[MA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Desarrollo de habilidades técnicas en ingeniería de software aplicando ingeniería inversa]]></article-title>
<source><![CDATA[Revista Boletín Redipe]]></source>
<year>2022</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>534-50</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[EJ]]></given-names>
</name>
<name>
<surname><![CDATA[Flores]]></surname>
<given-names><![CDATA[MA]]></given-names>
</name>
<name>
<surname><![CDATA[Sandoval]]></surname>
<given-names><![CDATA[GL]]></given-names>
</name>
<name>
<surname><![CDATA[Velázquez]]></surname>
<given-names><![CDATA[BL]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[JJ]]></given-names>
</name>
<name>
<surname><![CDATA[Velásquez]]></surname>
<given-names><![CDATA[LA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reverse engineering and straightforward design as tools to improve the teaching of mechanical engineering]]></article-title>
<source><![CDATA[Industry Integrated Engineering and Computing Education: Advances, Cases, Frameworks, and Toolkits for Implementation]]></source>
<year>2019</year>
<page-range>93-118</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verner]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Greenholts]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teacher education to analyze and design systems through reverse engineering In Educational Robotics in the Makers Era 1]]></article-title>
<source><![CDATA[Springer International Publishing]]></source>
<year>2017</year>
<page-range>122-32</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sejfia]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[A Pilot Study on Architecture and Vulnerabilities: Lessons Learned]]></source>
<year>2019</year>
<conf-name><![CDATA[ IEEE/ACM 2nd International Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering (ECASE)]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc>Montreal, QC, Canada </conf-loc>
<page-range>42-7</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[David]]></surname>
<given-names><![CDATA[AP]]></given-names>
</name>
</person-group>
<source><![CDATA[Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems]]></source>
<year>2021</year>
<publisher-name><![CDATA[Packt Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ismael]]></surname>
<given-names><![CDATA[MF]]></given-names>
</name>
<name>
<surname><![CDATA[Thanoon]]></surname>
<given-names><![CDATA[KH]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro]]></source>
<year>2022</year>
<conf-name><![CDATA[ 8th International Conference on Contemporary Information Technology and Mathematics (ICCITM)]]></conf-name>
<conf-date>2022</conf-date>
<conf-loc>Mosul, Iraq </conf-loc>
<page-range>227-31</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hausknecht]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Gruicic]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Anti-computer forensics]]></source>
<year>2017</year>
<conf-name><![CDATA[ 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc>Opatija, Croatia </conf-loc>
<page-range>1233-40</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peters]]></surname>
<given-names><![CDATA[MD]]></given-names>
</name>
<name>
<surname><![CDATA[Marnie]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Tricco]]></surname>
<given-names><![CDATA[AC]]></given-names>
</name>
<name>
<surname><![CDATA[Pollock]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Munn]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
<name>
<surname><![CDATA[Alexander]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Khalil]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Updated methodological guidance for the conduct of scoping reviews]]></article-title>
<source><![CDATA[JBI evidence synthesis]]></source>
<year>2020</year>
<volume>18</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2119-26</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[RK]]></given-names>
</name>
</person-group>
<source><![CDATA[Case study research: Design and methods]]></source>
<year>2013</year>
<publisher-name><![CDATA[Sage publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McGregor]]></surname>
<given-names><![CDATA[SL]]></given-names>
</name>
<name>
<surname><![CDATA[Murnane]]></surname>
<given-names><![CDATA[JA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Paradigm, methodology and method Intellectual integrity in consumer scholarship]]></article-title>
<source><![CDATA[International journal of consumer studies]]></source>
<year>2010</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>419-27</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[ME]]></given-names>
</name>
<name>
<surname><![CDATA[Arciniegas]]></surname>
<given-names><![CDATA[JL]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[JC]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mecanismo de Consulta para el Análisis de Arquitecturas Recuperadas]]></article-title>
<source><![CDATA[Información tecnológica]]></source>
<year>2017</year>
<volume>28</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>87-100</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[ME]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[JC]]></given-names>
</name>
<name>
<surname><![CDATA[Puello]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[QModel-XMI un mecanismo de consulta para modelos XMI]]></article-title>
<source><![CDATA[Revista Espacios]]></source>
<year>2020</year>
<volume>41</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>218-28</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jebb]]></surname>
<given-names><![CDATA[AT]]></given-names>
</name>
<name>
<surname><![CDATA[Ng]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Tay]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of key Likert scale development advances: 1995-2019]]></article-title>
<source><![CDATA[Frontiers in psychology]]></source>
<year>2021</year>
<volume>4</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>637547</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
