[1]
“Reverse Engineering Attacks on Android Applications: Techniques, Case Studies, and Defense Strategies”, JCSDT, vol. 1, no. 1, pp. 60–68, Jul. 2025, Accessed: Jul. 10, 2025. [Online]. Available: http://journals.unec.edu.az/index.php/jcsdt/article/view/28