[1]
F. Sulianta, “Various Malware Handling Technique”, CAC, vol. 23, no. 1, pp. 794–798, Jan. 2022, Accessed: Jul. 28, 2024. [Online]. Available: https://ca-c.org/CAC/index.php/cac/article/view/108