Study on constructing malware attack forensic procedure of digital evidence | IEEE Conference Publication | IEEE Xplore