1. Krishan, K., Kaur, P.: A generalized process of reverse engineering in software protection & security. Int. J. Comput. Sci. Mob. Comput. 4(5), 534–544 (2015). ISSN 2320–088X
2. http://globalstudy.bsa.org/2013/index.html . Last accessed 20 May 2015
3. Ertaul, L., Venkatesh, S.: Novel obfuscation algorithms for software security. In: 2005 International Conference on Software Engineering Research and Practice, SERP’05, pp. 209–215 (June 2005)
4. Ertaul, L., Venkatesh, S.: Jhide—a tool kit for code obfuscation. In: 8th IASTED International Conference on Software Engineering and Applications (SEA 2004), pp. 133–138 (Nov 2004)
5. Nehra, A., Meena, R., Sohu, D., Rishi, O.P.: A robust approach to prevent software piracy. In: Proceedings of Students Conference on Engineering and Systems, pp. 1–3. IEEE (March 2012)