[1]
H. A. Mujtaba and Gohar Mumtaz, “Incident Response: Analyzing Forensic Techniques Prevalent in Malware Attacks”, IJECI, vol. 9, no. 2, Nov. 2025.