1.
Kumar K, Kaur P. A Thorough Investigation of Code Obfuscation Techniques for Software Protection. Int. J. Comp. Sci. Eng. [Internet]. 2015 May 30 [cited 2026 Feb. 2];3(5):158-64. Available from: https://ijcse.isroset.org/index.php/j/article/view/517