Login / Signup
An Overview of Bootkit Attacking Approaches.
Xiang Li
Yan Wen
Minhuan Huang
Qiang Liu
Published in:
MSN (2011)
Keyphrases
</>
data sets
website
wide range
search algorithm
strengths and weaknesses
databases
preprocessing
trade off
medical images