[1]
V. Tsurkan and D. Voloshin, “Functional model of reverse engineering malware”, ITS, vol. 9, no. 2, pp. 200–208, Dec. 2021.