[1]
K. Kumar and P. Kaur, “A Thorough Investigation of Code Obfuscation Techniques for Software Protection”, Int. J. Comp. Sci. Eng., vol. 3, no. 5, pp. 158–164, May 2015.