Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines | IEEE Conference Publication | IEEE Xplore