[1]
M. R. . Ibrahim and K. Thanoon, “Quasar Remote Access Trojan feature extraction depending on Ethical Hacking”, Technium, vol. 4, no. 1, pp. 58–75, Jan. 2022.