[1]
“Reverse Engineering Attacks on Android Applications: Techniques, Case Studies, and Defense Strategies”, JCSDT, vol. 1, no. 1, pp. 60–68, Jul. 2025, doi: 10.30546/UNECCSDT.2025.01.060.