[1]
“Detection And Analysis Of Malware”, tjmitm, vol. 5, no. 1, pp. 68–70, Dec. 2014, Accessed: Mar. 14, 2025. [Online]. Available: https://journals.acspublisher.com/index.php/tjmitm/article/view/1313