User:MotoMoto1952/Trojan horse (computing)/Bibliography

You will be compiling your bibliography and creating an outline of the changes you will make in this sandbox.

Outline of proposed changes

 * 1) Dua, Sumeet, and R. K. Tiwari. "A Survey on Trojan Horse and Its Detection Methods." International Journal of Computer Applications 5, no. 3 (2010): 37-41.
 * 2) Theoharidou, Marianthi, Igor Nai Fovino, and Andrew B. S. Cuschieri. "A survey of security incidents on the Internet 1973–2003." Computers & Security 24, no. 3 (2005): 221-232.
 * 3) Symantec. "Trojan Horse." Symantec Security Response. Accessed April 18, 2024. https://www.symantec.com/security-center/writeup/2007-101013-0616-99.
 * 4) Microsoft. "Trojan horse." Microsoft Security Intelligence Report. Accessed April 18, 2024. https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3aWin32%2fLocker.A.
 * 5) McAfee. "What Is a Trojan Virus?" McAfee Blogs. Accessed April 18, 2024. https://www.mcafee.com/blogs/consumer/what-is-a-trojan-virus/.