[1]
V. Meghana, “Malware Analysis”, IJRESM, vol. 7, no. 2, pp. 51–55, Feb. 2024, doi: 10.5281/zenodo.10654721.