温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.eb.com/technology/trojan-computing
点击访问原文链接

Trojan | malware, viruses, security | Britannica

SUBSCRIBESUBSCRIBESUBSCRIBE TO PREMIUMHomeHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyGames & QuizzesVideosOn This DayOne Good FactDictionaryNew ArticlesHistory & SocietyLifestyles & Social IssuesPhilosophy & ReligionPolitics, Law & GovernmentWorld HistoryScience & TechHealth & MedicineScienceTechnologyBiographiesBrowse BiographiesAnimals & NatureBirds, Reptiles & Other VertebratesEnvironmentFossils & Geologic TimeInsects & Other InvertebratesMammalsPlantsGeography & TravelGeography & TravelArts & CultureEntertainment & Pop CultureLiteratureSports & RecreationVisual ArtsImage GalleriesPodcastsSummariesTop QuestionsLists and StoriesBritannica KidsAsk the ChatbotGames & QuizzesHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyVideostrojanIntroductionReferences & Edit HistoryQuick Facts & Related TopicsImagesComputers and Technology QuizPolitics, Law & GovernmentLaw, Crime & PunishmentFacebookXhttps://www.britannica.com/technology/trojan-computingCybersecurity and Infrastructure Security Agency - Recovering from a Trojan Horse or Virus (PDF)Scientific Reports - A framework for hardware trojan detection based on contrastive learningQueens University Belfast - Ten years of hardware Trojans: a survey from the attacker's perspective (PDF)International Journal of Engineering and Applied Sciences - Study on Computer Trojan Horse Virus and Its PreventionNational Center for Biotechnology Information - PubMed Central - System-level protection and hardware Trojan detection using weighted voting☆Britannica Editors Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree....Historymalicioussoftwarelegitimatebeneficialcomputer systemmalwareTrojan horseTroye-mailzombiecirculationmalicious purposesspamcybercrimeransomwaremalwaredenial of service attackzombie computerSee all related contentblackmailfraudidentity theftpersonal computerpaceBritannica Quiz Computers and Technology QuizAdam Augustyn

智能索引记录