Investigation of bypassing malware defences and malware detections | IEEE Conference Publication | IEEE Xplore