• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploring Rootkit Detectors' Vulnerabilities Using a New Windows Hidden Driver Based Rootkit.

Woei-Jiunn TsaurYuh-Chen Chen
Published in: SocialCom/PASSAT (2010)
Keyphrases
  • machine learning
  • information retrieval
  • countermeasures
  • real time
  • artificial intelligence
  • knowledge base
  • case study
  • object detection
  • information security