[1]
G. Kumar, “A Survey on Program Code Obfuscation Technique”, etj, vol. 1, no. 02, pp. 70–74, Oct. 2016.