Return to Article Details Experimental Analysis of Trojan Horse and Worm Attacks in Windows Environment Download Download PDF