A comparative analysis of rootkit detection techniques
暂无分享,去创建一个
[1] Cliff C. Zou,et al. WINDOWS ROOTKITS A GAME OF "HIDE AND SEEK" , 2011 .
[2] Amr M. Youssef,et al. On the analysis of the Zeus botnet crimeware toolkit , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[3] Kevin Borders,et al. Web tap: detecting covert web traffic , 2004, CCS '04.