Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User Activity | IEEE Journals & Magazine | IEEE Xplore