Detection of Trojan Horses by the analysis of system behavior and data packets | IEEE Conference Publication | IEEE Xplore