[1]
“Detection And Analysis Of Malware”, tjmitm, vol. 5, no. 1, pp. 68–70, Dec. 2014, Accessed: Jan. 31, 2026. [Online]. Available: https://www.acspublisher.com/journals/index.php/tjmitm/article/view/1313