[1]
F. Sulianta, “Various Malware Handling Technique”, CAC, vol. 23, no. 1, pp. 794–798, Jan. 2022, Accessed: Jan. 10, 2025. [Online]. Available: http://13.200.237.241/CAC/index.php/cac/article/view/108