{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T02:09:45Z","timestamp":1775182185233,"version":"3.50.1"},"reference-count":114,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia, through the Princess Nourah Bint Abdulrahman University Researchers Supporting Project","doi-asserted-by":"publisher","award":["PNURSP2024R411"],"award-info":[{"award-number":["PNURSP2024R411"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3394732","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T17:43:07Z","timestamp":1714412587000},"page":"62558-62580","source":"Crossref","is-referenced-by-count":11,"title":["Model-Driven Approaches for Reverse Engineering\u2014A Systematic Literature Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4693-8707","authenticated-orcid":false,"given":"Hanan Abdulwahab","family":"Siala","sequence":"first","affiliation":[{"name":"Department of Informatics, King&#x2019;s College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9706-1410","authenticated-orcid":false,"given":"Kevin","family":"Lano","sequence":"additional","affiliation":[{"name":"Department of Informatics, King&#x2019;s College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8169-3766","authenticated-orcid":false,"given":"Hessa","family":"Alfraihi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-1-55860-639-5.x5000-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47884-1_16"},{"key":"ref4","article-title":"Model-driven software evolution: A research agenda","author":"Van Deursen","year":"2007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0219-7"},{"key":"ref6","volume-title":"OMG Systems Modeling Language (UML), Version 2.5.1","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.02.007"},{"key":"ref8","volume-title":"Object Constraint Language 2.4 Specification, OMG Document Formal","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS-C59198.2023.00050"},{"key":"ref10","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"Kitchenham","year":"2007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9780470754887"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.04.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374913-0.00014-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2008.21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.130"},{"key":"ref16","first-page":"1","article-title":"Recovering sequence diagrams from object-oriented code: An ADM approach","volume-title":"Proc. 9th Int. Conf. Eval. Novel Approaches Softw. Eng. (ENASE)","author":"Martinez"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.118"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0004602900850092"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2015.05.003"},{"key":"ref20","first-page":"210","article-title":"A toolkit for ADM-based migration: Moving from PHP code to KDM model in the context of CMS-based web applications","volume-title":"Proc. 23rd Int. Conf. Inf. Syst. Develop. (ISD)","author":"Trias"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2696049"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080834"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2896982.2896984"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75209-7_33"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2012.21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374913-0.00011-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27997-3_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WSE.2012.6320538"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_17"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WSE.2013.6642418"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0130-2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.43"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2013.6577696"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950884"},{"key":"ref35","first-page":"1","article-title":"An approach to translate legacy \u2018C\u2019 code to Simulink\u00ae model using XML","volume-title":"Proc. Symp. Theory Model. Simulation DEVS Integrative M&S Symp.","author":"Kotekar"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5220\/0009769801040115"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00284-z"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.40"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32689-9_3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671316"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671329"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v9i1.1269"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2013.25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081863"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.32"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529307"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69554-7_11"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1822018.1822045"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5772\/32931"},{"key":"ref50","first-page":"723","article-title":"SyncTest: A tool to synchronize source code, model and testing","volume-title":"Proc. SEKE","author":"Bai"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2007.255"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141570"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2991\/ifmca-16.2017.43"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2981"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.20470\/jsi.v5i3.204"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5220\/0010821700003119"},{"key":"ref57","first-page":"816","article-title":"Visual contract extractor: A tool for reverse engineering visual contracts using dynamic analysis","volume-title":"Proc. 31st IEEE\/ACM Int. Conf. Automated Softw. Eng. (ASE)","author":"Alshanqiti"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69100-6_3"},{"key":"ref59","first-page":"3","article-title":"Injecting execution traces into a model-driven framework for program analysis","volume-title":"Proc. Softw. Technol. Appl. Found. Collocated Workshops (STAF)","author":"la Fosse"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2009.46"},{"key":"ref61","first-page":"49","article-title":"Industrial adoption of automatically extracted gui models for testing","volume-title":"Proc. EESSMod@MoDELS","author":"Aho"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2014.20"},{"key":"ref63","first-page":"140","article-title":"Towards automatic construction of reusable prediction models for component-based performance engineering","volume-title":"Software Engineering 2008","author":"Kappler","year":"2008"},{"key":"ref64","first-page":"293","article-title":"Reverse engineering of graphical user interfaces","volume-title":"Proc. 6th Int. Conf. Softw. Eng. Adv.","author":"Morgado"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2095050.2095093"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4324871"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.96"},{"issue":"3","key":"ref68","first-page":"45","article-title":"A hybrid approach for reverse engineering GUI model from Android apps for automated testing","volume":"9","author":"Salihu","year":"2017","journal-title":"J. Telecommun., Electron. Comput. Eng. (JTEC)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1674"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2016.7805051"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/11787044_17"},{"key":"ref72","first-page":"8","article-title":"Model-driven modernisation of Java programs with JaMoPP","volume-title":"Proc. 1st Int. Workshop Model-Driven Softw. Migration (MDSM), 5th Int. Workshop Syst. Quality Maintainability (SQM)","author":"Heidenreich"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.01.068"},{"issue":"3","key":"ref74","first-page":"97","article-title":"Reengineering legacy code with model transformation","volume":"8","author":"Methakullawat","year":"2014","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICoCS.2015.7483315"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2488-7.ch007"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.73"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2013.62"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2021.101051"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102202"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-021-09574-x"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3528639"},{"issue":"8","key":"ref83","first-page":"1239","article-title":"Visualization and synchronization of object-oriented programs using re-engineering approach","volume":"12","author":"Yaseen","year":"2019","journal-title":"Int. J. Eng. Technol."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CITISIA50690.2020.9371851"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2011.18"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICODSE.2016.7936137"},{"issue":"12","key":"ref87","first-page":"2174","article-title":"Towards a dynamic analysis of legacy systems for reverse-engineering interaction diagrams","volume":"98","author":"Bouziane","year":"2020","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.040"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.24"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2542686"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2532352.2532354"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.21533\/pen.v9i2.1829"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.21"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.28"},{"key":"ref95","first-page":"517","article-title":"Bridging KDM and ASTM for model-driven software modernization","volume-title":"Proc. SEKE","author":"Deltombe"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.5772\/32473"},{"key":"ref97","volume-title":"Eclipse EMF\u2014Eclipse Modeling Framework","year":"2023"},{"key":"ref98","volume-title":"Eclipse MoDisco\u2014Model Discovery","year":"2023"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1142\/sseke"},{"key":"ref100","first-page":"20601","article-title":"Unsupervised translation of programming languages","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst. (NIPS)","author":"Roziere"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21434"},{"key":"ref102","first-page":"1528","article-title":"Summarize and generate to back-translate: Unsupervised translation of programming languages","volume-title":"Proc. 17th Conf. Eur. Chapter Assoc. Comput. Linguistics","author":"Ahmad"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT57492.2022.10055851"},{"key":"ref104","first-page":"2552","article-title":"Tree-to-tree neural networks for program translation","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733518"},{"key":"ref106","first-page":"31","article-title":"A concise classification of reverse engineering approaches for software product lines","volume-title":"Proc. 11th Int. Conf. Softw. Eng. Adv. (ICSEA)","author":"Lau"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9499-z"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1965"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20322-0_9"},{"key":"ref110","first-page":"374","article-title":"Validity threats in empirical software engineering research\u2014An initial survey","volume-title":"Proc. SEKE","author":"Feldt"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.006"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00055"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/icsm.2010.5609583"},{"key":"ref114","article-title":"Large language models for software engineering: A systematic literature review","author":"Hou","year":"2023","journal-title":"arXiv:2308.10620"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10509696.pdf?arnumber=10509696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:40:47Z","timestamp":1715190047000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10509696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":114,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3394732","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}