Skip to main content
. 2022 Apr 25;2022:5061059. doi: 10.1155/2022/5061059

Figure 5.

Figure 5

Structure of signature-based malware detection.