References
[1]. Akbari, S. A. A. J., & Hussian, M. A. (2022). An effective
malware detection algorithm for WSN. ESP Journal of
Engineering and Technology Advancements, 2(1), 1-4.
[2]. Al Daoud, E., Jebril, I. H., & Zaqaibeh, B. (2008).
Computer virus strategies and detection methods.
International Journal of Open Problems in Computer
Science and Mathematics, 1(2), 12-20.
[4]. Baftiu, N., & Krabaj, S. (2019). Creating prototype
virus-destroying files and texts on any computer. Prizren
Social Science Journal, 3(1), 62-66.
[12]. Gounder, M. P., & Farik, M. (2017). New ways to fight
malware. International Journal of Scientific Technology
Research, 6(6), 313-318.
[13]. Gupta, Y., Ajithkumar, B., Kale, H. S., Nayak, S.,
Sabhapathy, S., Sureshkumar, S., ... & Roy, S. (2017). The
upgraded GMRT: Opening new windows on the radio
Universe. Current Science, 113(4), 707-714.
[14].
Jindal, H., Garg, Y., Kumar, S., Gautam, N., & Kumar,
R. (2021a). Social media in political campaigning: A
study. i-manager's Journal on Management, 16(1), 49-60.
[16]. Johari, M. F. H. (2015). Virus in the Computer and
Smartphone System (Doctoral dissertation, Faculty of Art and Design).
[18]. Mitra, U., Ortega, A., Heidemann, J., &
Papadopoulos, C. (2006). Detecting and identifying
malware: A new signal processing goal. IEEE Signal
Processing Magazine, 23(5), 107-111.
[22].
Rani, S., Beenu, Jindal, H., Gautam, N., & Kumar, S.
(2022). Importance of universal human values for life: A
study. Asian Journal of Science and Applied Technology,
11(1), 36-48.
[24]. Sharma, M., Jindal, H., Kumar, S., & Kumar, R. (2021).
Overview of data security, classification and control
measure: A study. i-manager's Journal on Information
Technology, 11(1), 17-34.
[29]. Tuli, B., Bhardwaj, B., Kumar, S., & Gautam, N.
(2022d). An extensive overview on human-computer
interaction (HCI) application. i-manager's Journal on
Software Engineering, 17(1), 24-37.
[36]. Yusuf, M. S., Onotehinwa, T. O., & Okon, E. O. (2017).
Productivity of business enterprises: Effect of computer virus infection on files. International Journal of Computer
Science and Mobile Computing, 6(2), 179-193.