Computer Science ›› 2008, Vol. 35 ›› Issue (2): 96-98.
Previous Articles Next Articles
Online:
Published:
Abstract: Stealthy malicious r.ootkits evade inspection of administrators and.host-based.security detection tools by modifying operating system kernel programs and instructions, then bring unreal pivotal information to system and securityutilities. With the analysi
Key words: Intrusion detection, Malware, Rootkit, Stealth
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I2/96
Cited