1. Alitavoli M, Joafshani M, Erfanian A (2013) A novel watermarking method for java programs. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing SAC '13. ACM, New York, NY, USA, pp 1013–1018
2. Arboit G (2002) A method for watermarking java programs via opaque predicates. ACM, Montreal, Canada, pp 102–110
3. Balachandran V, Keong NW, Emmanuel S (2014) Function level control flow obfuscation for software security. In: Eighth International Conference on Complex, Intelligent and Software Intensive Systems. IEEE, pp 133–140
4. Bento L, Boccardo D, Machado R, de Sá VGP, Szwarcfiter JL, Duque de Caxias R (2004) A randomized graph-based scheme for software watermarking. In: Information and Computater Systems Security. ACM, pp 30–41
5. Bentoa LM, Boccardob DR, Machadob RC, de Sáa VGP, Szwarcfitera JL (2014) Full characterization of a class of graphs tailored for software wateramrking. submitt J Comput Syst Sci