[1]
Hashim, M.A. et al. 2017. Digital Forensic Investigation of Trojan Attacks in Network using Wireshark, FTK Imager and Volatility. Journal of Computing Research and Innovation. 2, 2 (Jun. 2017), 60–65.