Aiman Hanna profile picture

Aiman Hanna

Is this your author profile? Create an account to customize it!

Stand Alone

Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting
Binary Code Fingerprinting for Cybersecurity Application to Malicious Code Fingerprinting