700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
Due to the advancement of malware which gains privileges to the operating system and drops a malicious code, and allowing unauthorized access to the target computer networks. One of this malware includes a Trojan horse which has access to computer or network with the aid of a user, whether knowingly or unknowingly. This paper presents a frame work of detecting a Trojan horse in network environment (client/server) so as to tackle present kind of Trojan horses (BINGHE). The result of the experiment shows a great potential of the method in allowing the detection and analysing different behaviour and attack of Trojan horse malware in computer and client/server network.
To read the full article Peer-reviewed Article PDF
Author(s): Ahmed Aliyu, Sani Danjuma, Bo Dai , Usman Waziri, Abubakar Ado