1. Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation, and future directions;Akhunzada;J. Netw. Comput. Appl.,2015
2. Perceive Core Logical Blocks of a C Source Code Automatically for Source Code Transformations;Ahire,2018
3. Applications of Homomorphic Functions to Software Obfuscation. Intelligence and Security Informatics;Zhu,2006
4. Concepts and Techniques in Software Watermarking and Obfuscation;Zhu,2007