Return to Conference Proceedings Submission Details Strategy Protecting Networking System from Trojan using Firewall and Encryption Data Download Download PDF