Login / Signup
Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.
Woei-Jiunn Tsaur
Yuh-Chen Chen
Published in:
SocialCom/PASSAT (2010)
Keyphrases
</>
machine learning
information retrieval
countermeasures
real time
artificial intelligence
knowledge base
case study
object detection
information security