Search by :
Last search:
This research is based on the process of visualizing malware capture data into a grayscale image, from the grayscale image there is a repeating pattern, the pattern will be taken using the Gray Lev…