Jump to content

User:MotoMoto1952/Trojan horse (computing)/Bibliography

From Wikipedia, the free encyclopedia

You will be compiling your bibliography and creating an outline of the changes you will make in this sandbox.


Bibliography

[edit]

Edit this section to compile the bibliography for your Wikipedia assignment. Add the name and/or notes about what each source covers, then use the "Cite" button to generate the citation for that source.

References

[edit]

Outline of proposed changes

[edit]
  1. Dua, Sumeet, and R. K. Tiwari. "A Survey on Trojan Horse and Its Detection Methods." International Journal of Computer Applications 5, no. 3 (2010): 37-41.
  2. Theoharidou, Marianthi, Igor Nai Fovino, and Andrew B. S. Cuschieri. "A survey of security incidents on the Internet 1973–2003." Computers & Security 24, no. 3 (2005): 221-232.
  3. Symantec. "Trojan Horse." Symantec Security Response. Accessed April 18, 2024. https://www.symantec.com/security-center/writeup/2007-101013-0616-99.
  4. Microsoft. "Trojan horse." Microsoft Security Intelligence Report. Accessed April 18, 2024. https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3aWin32%2fLocker.A.
  5. McAfee. "What Is a Trojan Virus?" McAfee Blogs. Accessed April 18, 2024. https://www.mcafee.com/blogs/consumer/what-is-a-trojan-virus/.