Login / Signup

A study on intrusion protection techniques against Linux kernel backdoor.

Jin Taek KimJeong-Ho KhoMin-Seok HongChoul Woong SonDo-Won LeeSang-Jo YoukGeuk Lee
Published in: ICHIT (2009)
Keyphrases
  • empirical studies
  • linux kernel
  • statistical analysis
  • experimental study
  • database
  • data sets
  • neural network
  • source code
  • operating system
  • privacy protection
  • data protection