Ghossoon. M. W. Al-Saadoon

Sorry, we do not have enough data to show an influence graph for this author.
Learn More
—Trojan virus attacks pose one of the most serious threats to computer security. A Trojan horse is typically separated into two parts – a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection is(More)
  • 1