[1]
P. PERRONE, A. SILVESTRE, and G. TARASCHI, “A Computer Abusive Access Case Study Solved with Windows Registry Analysis”, IC3, vol. 10, pp. 106–112, May 2023.