Login / Signup
Three control flow obfuscation methods for Java software.
Ting-Wei Hou
Hsiang-Yang Chen
Ming-Hsiu Tsai
Published in:
IEE Proc. Softw. (2006)
Keyphrases
</>
control flow
data flow
data structure
decision trees
software testing
cross platform
learning algorithm
database systems
knowledge representation
software development
error rate
reverse engineering
transition systems