[1]
K. Shulika, D. Balagura, and Z. Sydorenko, “Analysis of methods for bypassing modern EDR endpoint protection systems”, RT, vol. 2, no. 217, pp. 64–68, Jun. 2024.