Author Login Chief Editor Login Reviewer Login Editor Login Remote Office
Remote Control Trojan Vulnerability Mining Based on Reverse Analysis of Network Protocol
PAN Daoxin,WANG Yijun,XUE Zhi
Computer Engineering . 2016, (2): 146 -150,156 .  DOI: 10.3969/j.issn.1000-3428.2016.02.027