Rootkit Detection Experiment within a Virtual Environment
暂无分享,去创建一个
[1] Vytautas Štuikys,et al. Power Awareness Experiment for Crypto Service-Based Algorithms , 2010 .
[2] Hsien-Hsin S. Lee,et al. SHARK: Architectural support for autonomic protection against stealth by rootkit exploits , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[3] Marcin Habrych,et al. Autonomous Monitoring System of Environment Conditions , 2010 .
[4] Andrea C. Arpaci-Dusseau,et al. VMM-based hidden process detection and identification using Lycosid , 2008, VEE '08.
[5] Yoshiyasu Takefuji,et al. Towards a tamper-resistant kernel rootkit detector , 2007, SAC '07.
[6] Jong Sou Park,et al. Cloud computing: future solution for e-governance , 2009, ICEGOV '09.
[7] Michael Bowman,et al. An undergraduate rootkit research project: How available? How hard? How dangerous? , 2007, InfoSecCD '07.
[8] Vytautas Štuikys,et al. Application-Level Energy Consumption In Communication Models For Handhelds , 2009 .
[9] Vytautas Štuikys,et al. Embedded program specialization for multiple criteria trade-offs , 2008 .
[10] D. Eidukas,et al. Electronic Plant Leaf Testing System , 2008 .
[11] J. Rutkowska. Introducing Stealth Malware Taxonomy , 2006 .