Forensic characteristics of creation, use and distribution of malicious computer programs
Malicious software and viral phishing attacks have remained for several consecutive years among the most effective tools for infiltrating information infrastructure. In the vast majority of cases, the exploitation of malicious software is associated with gaining ...