Login / Signup
Companion Viruses and the Macintosh: Threats and Countermeasures.
Jeffrey Horton
Jennifer Seberry
Published in:
ACISP (1999)
Keyphrases
</>
countermeasures
cyber attacks
information security
virus detection
rural areas
security breaches
security measures
power analysis
database
security issues
java card
case study
wireless sensor networks
information technology
computer viruses
real world
databases