Login / Signup
Invisible Intruders: Rootkits in Practice.
David Brumley
Published in:
login Usenix Mag. (2015)
Keyphrases
</>
real world
computer vision
website
image segmentation
search algorithm
object recognition
information technology
image analysis