A comparative analysis of rootkit detection techniques

[1]  Cliff C. Zou,et al.  WINDOWS ROOTKITS A GAME OF "HIDE AND SEEK" , 2011 .

[2]  Amr M. Youssef,et al.  On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[3]  Kevin Borders,et al.  Web tap: detecting covert web traffic , 2004, CCS '04.