1. Aho, A., Sethi, R., & Ullman, J. (1985). Compilers: Principles, Techniques, and Tools (2nd ed.). Reading: Addison-Wesley.
2. Amstrong, M., & Trudeau, C. (1998) Evaluating architecture extractors. In Proceedings of the 5th Working Conference on Reverse Engineering (WCRE 98). Honolulu, Hawaii, USA (pp. 30-39).
3. Angyal, L., Lengyel, L., & Charaf, H. (2006). An Overview of the State-of-the-Art Reverse Engineering Techniques. In Proceedings of the 7th International Symposium of Hungarian Researchers on Computational Intelligence (pp. 507 - 516).
4. Antoniol, G., Fiutem, R., Lutteri, G., Tonella, P., & Zanfei, S. (1997) Program understanding and mintenance with the CANTO environment. In Proceedings of the International Conference on Software Maintenance. Bari, Italy (pp. 72-81)
5. An evaluation of reverse engineering tool capabilities