[1]
“Behavioral Analysis of Backdoor Malware Exploiting Heap Overflow Vulnerabilities Using Data Mining and Machine Learning”, PJETS, vol. 11, no. 1, pp. 1–13, Nov. 2023, doi: 10.22555/pjets.v11i1.984.