1. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection;Collberg,2009
2. Malware: Fighting Malicious Code;Skoudis,2004
3. Procedures for performing systematic reviews;Kitchenham,2004
4. The benefits and challenges of using systematic reviews in international development research;Mallett;J. Dev. Effectiveness,2012
5. Code obfuscation literature survey;Balakrishnan,2005