Exploring Windows UAC bypasses: Techniques and detection strategies