[1]
“Malicious Software Analysis”, csecurity, vol. 1, no. 2, pp. 62–66, Mar. 2019, doi: 10.14421/csecurity.2018.1.2.1374.