Return to Article Details
Forensic analysis of bad USB attacks: A methodology for detecting and mitigating malicious USB device activities
Download
Download PDF