Malicious objects trafficking in the network | IEEE Conference Publication | IEEE Xplore