Works matching Rootkits (Computer software)
1
- Pertanika Journal of Science & Technology, 2013, v. 21, n. 2, p. 507
- Teh Jia Yew;
- Samsudin, Khairulmizam;
- Udzir, Nur Izura;
- Hashim, Shaiful Jahari
- Article
2
- Vietnam Journal of Computer Science (Springer Nature), 2017, v. 4, n. 4, p. 245, doi. 10.1007/s40595-017-0095-3
- Demertzis, Konstantinos;
- Iliadis, Lazaros
- Article
3
- African Journal of Computing & ICT, 2020, v. 13, n. 3, p. 42
- Subairu, S. O.;
- Alhassan, J. K.;
- Nwaocha, V. O.;
- Saidu, I. R.
- Article
4
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 1, doi. 10.3969/j.issn.1001-3695.2014.01.001
- SHI Jiang-yong;
- WANG Hui-mei;
- XIAN Ming;
- RONG Hong;
- JIN Cong-jun
- Article
5
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 1, p. 67, doi. 10.19107/IJISC.2017.01.08
- SUBAIRU, S. O.;
- ISAH, A. O.;
- ALHASSAN, J. K.
- Article
6
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3580, doi. 10.1002/sec.1282
- Guanglu Yan;
- Senlin Luo;
- Fan Feng;
- Limin Pan;
- Safi, Qamas Gul Khan
- Article
7
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1872, doi. 10.1002/sec.902
- Eskandari, Mojtaba;
- Raesi, Hooman
- Article
8
- Security & Communication Networks, 2013, v. 6, n. 12, p. 1590, doi. 10.1002/sec.166
- Embleton, Shawn;
- Sparks, Sherri;
- Zou, Cliff C.
- Article
9
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1722, doi. 10.3837/tiis.2017.03.026
- Chaoyuan Cui;
- Yun Wu;
- Yonggang Li;
- Bingyu Sun
- Article
10
- Multimedia Tools & Applications, 2017, v. 76, n. 17, p. 18153, doi. 10.1007/s11042-016-4189-1
- Jeong, Eun;
- Kim, In;
- Lee, Dong
- Article
11
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 670, doi. 10.1109/TDSC.2010.38
- Baliga, Arati;
- Ganapathy, Vinod;
- Iftode, Liviu
- Article
12
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-019-0043-x
- Article
13
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 2, p. 7
- Article
14
- Journal of Digital Forensics, Security & Law, 2013, p. 137
- Al-Shaheri, Sami;
- Lindskog, Dale;
- Zavarsky, Pavol;
- Ruhl, Ron
- Article
15
- Journal of Digital Forensics, Security & Law, 2013, p. 101
- Article
16
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 455
- CHI-WEI WANG;
- CHONG-KUAN CHEN;
- CHIA-WEI WANG;
- SHIEH, SHIUHPYNG WINSTON
- Article
17
- Electronics & Electrical Engineering, 2010, n. 104, p. 63
- Article
18
- Journal of Applied Security Research, 2009, v. 4, n. 3, p. 389, doi. 10.1080/19361610902930212
- Article
19
- IEEE Internet Computing, 2007, v. 11, n. 1, p. 16
- Article