Obfuscation and methods of protection software
Main Article Content
Abstract
This article focuses on the technical review of the main methods of protection software. The process of obfuscation to date one of the most popular and commonly used methods of protection, so it is in a separate block for a more detailed study.
Article Details
Section
COMPUTER SECURITY