Iacob, I. C. (2015) “Reverse Engineering Malicious Applications”, Journal of Mobile, Embedded and Distributed Systems, 7(2), pp. 65-86. Available at: http://jmeds.eu/index.php/jmeds/article/view/Reverse_Engineering_Malicious_Applications (Accessed: 4December2024).