(1)
De-Obfuscating Emerging Malware Threats Using Reverse Engineering Techniques. IJLTEMAS 2025, 14 (10), 1307-1312. https://doi.org/10.51583/IJLTEMAS.2025.1410000156.