[1]
“Reverse Engineering Attacks on Android Applications: Techniques, Case Studies, and Defense Strategies”, JCSDT, vol. 1, no. 1, pp. 60–68, Jul. 2025, Accessed: Aug. 08, 2025. [Online]. Available: https://journals.unec.edu.az/jcsdt/article/view/28