[1]
“Malware Visualization Techniques”, J. Appl. Methods Electron. Comput., vol. 8, no. 1, pp. 7–20, Mar. 2020, doi: 10.18100/ijamec.526813.