[1]
F. Sulianta, “Various Malware Handling Technique”, CAC, vol. 23, no. 1, pp. 794–798, Jan. 2022, Accessed: May 02, 2025. [Online]. Available: https://www.ca-c.org/CAC/index.php/cac/article/view/108