C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Woei-Jiunn Tsaur
Yuh-Chen Chen
Published in:
SocialCom/PASSAT (2010)
Keyphrases
</>
machine learning
information retrieval
countermeasures
real time
artificial intelligence
knowledge base
case study
object detection
information security