Cited By
View all- Hosseinzadeh SRauti SLaurén SMäkelä JHolvitie JHyrynsalmi SLeppänen V(2018)Diversification and obfuscation techniques for software security: A systematic literature reviewInformation and Software Technology10.1016/j.infsof.2018.07.007104(72-93)Online publication date: Dec-2018
- Brooks R(2009)ReferencesDisruptive Security Technologies with Mobile Code and Peer-to-Peer Networks10.1201/9781420038880.bmattOnline publication date: 7-Dec-2009
- Brooks R(2009)ReferencesDisruptive Security Technologies with Mobile Code and Peer-to-Peer Networks10.1201/9781420038880.bmattOnline publication date: 7-Dec-2009