Skip to main content
. 2022 Sep 15;12:15498. doi: 10.1038/s41598-022-18936-9

Figure 5.

Figure 5

Image visualization of (a) malware and (b) benign files.