Sign in

A Brief Survey on Rootkit Techniques in Malicious Codes.

Sungkwan KimJunyoung ParkKyungroul LeeIlsun YouKangbin Yim
Published in: J. Internet Serv. Inf. Secur. (2012)
Keyphrases
  • real time
  • machine learning
  • error correction
  • malicious attacks
  • database
  • data sets
  • data collection
  • learning environment
  • cross sectional
  • error correcting codes
  • logical operations
  • malicious users
  • parity check