Return to Article Details Identification of the malicious group’s digital trace using cryptography tools Download Download PDF