Cited By
View all- Sharma SVashisth SDhall I(2023)Flexible Reverse Engineering of Desktop and Web ApplicationsComputational Intelligence for Engineering and Management Applications10.1007/978-981-19-8493-8_45(609-624)Online publication date: 30-Apr-2023
- Xu HZhou YMing JLyu M(2020)Layered obfuscation: a taxonomy of software obfuscation techniques for layered securityCybersecurity10.1186/s42400-020-00049-33:1Online publication date: 3-Apr-2020
- Ouffoue GZaidi FCavalli ALallali M(2017)How Web Services Can Be Tolerant to Intruders through Diversification2017 IEEE International Conference on Web Services (ICWS)10.1109/ICWS.2017.50(436-443)Online publication date: Jun-2017
- Show More Cited By