Approaches to handling "Trojan Horse" threats

Yeheskel Lapid, Niv Ahituv, Seev Neumann. Approaches to handling "Trojan Horse" threats. Computers & Security, 5(3):251-256, 1986. [doi]

Abstract

Abstract is missing.