{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:39:07Z","timestamp":1730209147607,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/coginfocom.2014.7020512","type":"proceedings-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T15:33:22Z","timestamp":1422372802000},"page":"521-525","source":"Crossref","is-referenced-by-count":2,"title":["Cognitive evaluation of intermediate level obfuscator"],"prefix":"10.1109","author":[{"given":"Dmitriy","family":"Dunaev","sequence":"first","affiliation":[]},{"given":"Laszlo","family":"Lengyel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom.2013.6719206"},{"journal-title":"A Taxonomy of Obfuscating Transformations","year":"1997","author":"collberg","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2012.20"},{"key":"3","first-page":"2","author":"bless","year":"2004","journal-title":"Social Cognition How Individuals Construct Social Reality"},{"key":"2","article-title":"Techniques of program code obfuscation for secure software","volume":"3","author":"popa","year":"2011","journal-title":"Journal of Mobile Embedded and Distributed Systems"},{"key":"1","first-page":"67","article-title":"Definition and synergies of cognitive infocommunications","volume":"9","author":"baranyi","year":"2012","journal-title":"Acta Polytechnica Hungarica"},{"key":"10","first-page":"337","article-title":"An analysis of the design and definitions of Halstead's metrics","author":"al qutaish","year":"2005","journal-title":"Proceedings of the 15th International Workshop on Software Measurement IWSM'2005 (Montreal Canada)"},{"key":"7","first-page":"32","article-title":"Formal considerations and a practical approach to intermediate-level obfuscation","author":"dunaev","year":"2014","journal-title":"WSEAS Volume 1 of Transactions on Information Science and Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.60"},{"key":"5","first-page":"1","article-title":"On the (im)possibility of obfuscating programs","author":"barak","year":"2001","journal-title":"Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology CRYPTO'01 (London UK)"},{"journal-title":"Non-black-box Techniques in Cryptography","year":"2004","author":"barak","key":"4"},{"key":"9","first-page":"36","article-title":"Overview of an obfuscation algorithm","author":"dunaev","year":"2012","journal-title":"Proceedings of the International Conference on Computer Science and Information Technologies CSIT'2012 (Lvov Ukraine)"},{"key":"8","article-title":"Modern compiler design","author":"grune","year":"2001","journal-title":"Worldwide Series in Computer Science"}],"event":{"name":"2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom)","start":{"date-parts":[[2014,11,5]]},"location":"Vietri sul Mare, Italy","end":{"date-parts":[[2014,11,7]]}},"container-title":["2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7006293\/7020399\/07020512.pdf?arnumber=7020512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T05:48:15Z","timestamp":1490334495000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7020512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/coginfocom.2014.7020512","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}