Login / Signup

Three control flow obfuscation methods for Java software.

Ting-Wei HouHsiang-Yang ChenMing-Hsiu Tsai
Published in: IEE Proc. Softw. (2006)
Keyphrases