Login / Signup

The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures.

Sebastian EresheimRobert LuhSebastian Schrittwieser
Published in: J. Inf. Process. (2017)
Keyphrases
  • countermeasures
  • information security
  • power analysis
  • databases
  • rural areas
  • association rules
  • evolution process
  • security measures
  • data mining
  • knowledge management
  • reverse engineering