[1]
Katie Moussouris, “Investigating the Proliferation of Sophisticated Cyber Threats Through Malware Obfuscation and Zero-Day Exploitation in Distributed Networks”, ISCSITR-IJCS, vol. 6, no. 2, pp. 1–8, Apr. 2025, Accessed: Oct. 08, 2025. [Online]. Available: https://iscsitr.in/index.php/ISCSITR-IJCS/article/view/ISCSITR-IJCS_06_02_001