Full Text Available

Note: Clicking the button above will open the full text document at the original institutional repository in a new window.

An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation

Saved in:
Bibliographic Details
Published in:IEEE Access
Format: Online Article RSS Article
Published: 2026
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864030191367487492
collection WordPress RSS
FRELIP Feed Integration
container_title IEEE Access
description
discipline_display Engineering & Technology
discipline_facet Engineering & Technology
format Online Article
RSS Article
genre Journal Article
id rss_article:10149
institution FRELIP
journal_source_facet IEEE Access
publishDate 2026
publishDateSort 2026
record_format rss_article
spellingShingle An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
Computer Science & Information Science
Computer Science & IT
Engineering & Technology
sub_discipline_display Computer Science & IT
sub_discipline_facet Computer Science & IT
subject_display Computer Science & Information Science
Computer Science & IT
Engineering & Technology
Computer Science & Information Science
Computer Science & IT
Engineering & Technology
subject_facet Computer Science & Information Science
Computer Science & IT
Engineering & Technology
title An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_auth An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_full An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_fullStr An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_full_unstemmed An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_short An In-Depth Exploration of Malware Persistence: Reverse Engineering, Defense, and Simulation
title_sort an in-depth exploration of malware persistence: reverse engineering, defense, and simulation
topic Computer Science & Information Science
Computer Science & IT
Engineering & Technology
url http://ieeexplore.ieee.org/document/11424417