1.
De-Obfuscating Emerging Malware Threats Using Reverse Engineering Techniques. IJLTEMAS. 2025;14(10):1307-1312. doi:10.51583/IJLTEMAS.2025.1410000156