Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Effective methods to detect metamorphic malware: a systematic review
Mustafa Irshad; Haider M. Al-Khateeb; Ali Mansour; Moses Ashawa; Muhammad Hamisu
International Journal of Electronic Security and Digital Forensics (IJESDF), 2018 Vol.10 No.2, pp.138 - 154
19 - 1 =

Thank you for your feedback.