[1]
M. A. Hashim, “Digital Forensic Investigation of Trojan Attacks in Network using Wireshark, FTK Imager and Volatility”, JCRINN, vol. 2, no. 2, pp. 60–65, Jun. 2017.