Login / Signup
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Julian B. Grizzard
John G. Levine
Henry L. Owen
Published in:
ESORICS (2004)
Keyphrases
</>
management system
complex systems
information systems
database
neural network
information retrieval
search algorithm
information technology
user interface
distributed systems
intelligent systems
learning systems