A New approach to handling a "Trojan horse" threat

Niv Ahituv, Yeheskel Lapid, Seev Neumann

Research output: Working paper / PreprintWorking paper

Original languageEnglish
Place of PublicationTel Aviv
PublisherIsrael Institute of Business Research
Number of pages19
StatePublished - 1985

Publication series

NameWorking paper (Israel Institute of Business Research)
PublisherIsrael Institute of Business Research
Volumeno. 85/879

ULI Keywords

  • uli
  • Computer crimes
  • Computer programs -- Verification
  • Computers -- Access control
  • Data protection
  • Electronic data processing departments -- Security measures
  • Computer fraud
  • Computers and crime
  • Cyber crimes
  • Cybercrimes
  • Electronic crimes (Computer crimes)
  • Internet crimes
  • Verification of computer programs
  • Data governance
  • Data regulation
  • Personal data protection
  • Protection, Data
  • Data security
  • Computer department security measures

Cite this