@dblp

Two Control Computation Transformation Methods for Obfuscating Java Soft Software.

, und . Web Technologies, Applications, and Services, Seite 48-52. IASTED/ACTA Press, (2005)

Beschreibung

dblp

Links und Ressourcen

Tags