Login / Signup
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
John G. Levine
Julian B. Grizzard
Henry L. Owen
Published in:
IWIA (2004)
Keyphrases
</>
higher level
detection method
kernel function
support vector
density estimation
lower level
design methodology
levels of abstraction
neural network
data mining
genetic algorithm
information systems
low level
object detection
detection algorithm
gaussian processes