Process Injection and Migration Techniques: * Strategies to Bypass Security Software of Network Communication after a Successful Reverse shell | IEEE Conference Publication | IEEE Xplore