1. Rauti, S., and Leppänen, V. (2018, January 26–27). A comparison of online JavaScript obfuscators. Proceedings of the 2018 International Conference on Software Security and Assurance (ICSSA), Seoul, Republic of Korea.
2. Measuring software obfuscation quality—A systematic literature review;Ebad;IEEE Access,2021
3. Sherif, A. (2024, June 08). Mobile Operating Systems—Statistics & Facts, 10 January 2024. Available online: https://www.statista.com/topics/3778/mobile-operating-systems/#topicOverview.
4. Wang, H., Li, H., Li, L., Guo, Y., and Xu, G. (June, January 27). Why are android apps removed from google play? A large-scale empirical study. Proceedings of the 15th International Conference on Mining Software Repositories, Gothenburg, Sweden.
5. Collberg, C., Thomborson, C., and Low, D. (1997). A Taxonomy of Obfuscating Transformations, Department Computer Science, University of Auckland. Available online: https://researchspace.auckland.ac.nz/bitstream/handle/2292/3491/TR148.pdf.