Skip to main content
. 2021 Jan 22;7:e346. doi: 10.7717/peerj-cs.346

Figure 5. Typical metamorphic malware propagation.

Figure 5