Login / Signup
Program Obfuscation by Strong Cryptography.
Zeljko Vrba
Pål Halvorsen
Carsten Griwodz
Published in:
ARES (2010)
Keyphrases
</>
static analysis
control flow
cellular automata
reverse engineering
dynamic analysis
data sets
information security
computer programs
real time
neural network
artificial intelligence
multi agent
object oriented
operating system
regular expressions