Normal view MARC view
  • Information Security-Metamorphic Techniques

Information Security-Metamorphic Techniques (Topical Term)

Preferred form: Information Security-Metamorphic Techniques

Machine generated authority record.

Work cat.: (NUST): Mumtaz Zainub 35064, Metamorphic Techniques and Their Application on Havex Malware

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.