[1]
W. Pranoto, “Malicious Software Analysis”, csecurity, vol. 1, no. 2, pp. 62–66, Mar. 2019.