2015
DOI: 10.1016/s1361-3723(15)70005-9
|View full text |Cite
|
Sign up to set email alerts
|

The first 10 years of the Trojan Horse defence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Finally, a small historical lesson may also be drawn. The first Trojan Horse Defence (THD) [34,35] was successful at least in part because its low plausibility was not appreciated with any degree of certainty at the time of the trial; however, subsequent quantitative analysis based on complexity theory was able to attach probabilities to each of a number of different THD scenarios [36]. The putative Inadvertent Download Defence (IDD) against the possession of small quantities of child pornography has also been analysed quantitatively using statistical Urn methods to determine its plausibility with numerical data from two actual cases that ultimately did not go to trial [37].…”
Section: Discussionmentioning
confidence: 99%
“…Finally, a small historical lesson may also be drawn. The first Trojan Horse Defence (THD) [34,35] was successful at least in part because its low plausibility was not appreciated with any degree of certainty at the time of the trial; however, subsequent quantitative analysis based on complexity theory was able to attach probabilities to each of a number of different THD scenarios [36]. The putative Inadvertent Download Defence (IDD) against the possession of small quantities of child pornography has also been analysed quantitatively using statistical Urn methods to determine its plausibility with numerical data from two actual cases that ultimately did not go to trial [37].…”
Section: Discussionmentioning
confidence: 99%
“…of child pornography) amongst a much larger number of non-illicit material (e.g. of adult pornography) it is possible to use an Urn Model [ 28 , 29 ] and the Binomial Theorem to calculate the probability of the inadvertent download defence, under the assumption of random browsing activity. In two actual cases from Hong Kong, China the 95% confidence interval for the plausibility of this defence was shown to be ca.…”
Section: Proposition Plausibility Metricsmentioning
confidence: 99%
“…[1] Hackers often use it with Backdoor, connecting computers between the hacker and the victim, to steal someone's account and password or Confidential information or both. A Trojan also can be used in controlling the victim's computer to attack other computer.…”
Section: A Definition Of the Trojanmentioning
confidence: 99%