Login / Signup

Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.

Woei-Jiunn TsaurYuh-Chen Chen
Published in: SocialCom/PASSAT (2010)
Keyphrases
  • machine learning
  • information retrieval
  • countermeasures
  • real time
  • artificial intelligence
  • knowledge base
  • case study
  • object detection
  • information security