Article,

Approaches to handling "Trojan Horse" threats.

, , and .
Comput. Secur., 5 (3): 251-256 (1986)

Meta data

Tags

Users

  • @dblp

Comments and Reviews