Code Obfuscation for Effectively Securing Data in theWeb-Based Industry
暂无分享,去创建一个
[1] Nasir D. Memon,et al. Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.
[2] Byung Kook Kim,et al. Measuring the machine intelligence quotient (MIQ) of human-machine cooperative systems , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[3] D. B. Fogel,et al. Evolution and computational intelligence , 1995, Proceedings of ICNN'95 - International Conference on Neural Networks.
[4] Toshiaki Tanaka,et al. An Obfuscation Scheme Using Affine Transformation and Its Implementation , 2006 .
[5] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..