Login / Signup
A study on intrusion protection techniques against Linux kernel backdoor.
Jin Taek Kim
Jeong-Ho Kho
Min-Seok Hong
Choul Woong Son
Do-Won Lee
Sang-Jo Youk
Geuk Lee
Published in:
ICHIT (2009)
Keyphrases
</>
empirical studies
linux kernel
statistical analysis
experimental study
database
data sets
neural network
source code
operating system
privacy protection
data protection