Works matching DE "ROOTKITS (Computer software)"
Results: 17
A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit.
- Published in:
- African Journal of Computing & ICT, 2020, v. 13, n. 3, p. 42
- By:
- Publication type:
- Article
Rootkit Detection Experiment within a Virtual Environment.
- Published in:
- Electronics & Electrical Engineering, 2010, n. 104, p. 63
- Publication type:
- Article
MrKIP: Rootkit Recognition With Kernel Function Invocation Pattern.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 455
- By:
- Publication type:
- Article
An emerging threat Fileless malware: a survey and research challenges.
- Published in:
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. 1, doi. 10.1186/s42400-019-0043-x
- By:
- Publication type:
- Article
Lightweight Intrusion Detection of Rootkit with VMI-Based Driver Separation Mechanism.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1722, doi. 10.3837/tiis.2017.03.026
- By:
- Publication type:
- Article
SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 17, p. 18153, doi. 10.1007/s11042-016-4189-1
- By:
- Publication type:
- Article
MOSKG: countering kernel rootkits with a secure paging mechanism.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3580, doi. 10.1002/sec.1282
- By:
- Publication type:
- Article
Frequent sub-graph mining for intelligent malware detection.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1872, doi. 10.1002/sec.902
- By:
- Publication type:
- Article
SMM rootkit: a new breed of OS independent malware.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 12, p. 1590, doi. 10.1002/sec.166
- By:
- Publication type:
- Article
Rootkit Guard (RG) - An Architecture for Rootkit Resistant File-System Implementation Based on TPM.
- Published in:
- Pertanika Journal of Science & Technology, 2013, v. 21, n. 2, p. 507
- By:
- Publication type:
- Article
Summarize of detection methods on hardware-based virtualization machine rootkit.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 1, doi. 10.3969/j.issn.1001-3695.2014.01.001
- By:
- Publication type:
- Article
Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit.
- Published in:
- International Journal of Information Security & Cybercrime, 2017, v. 6, n. 1, p. 67, doi. 10.19107/IJISC.2017.01.08
- By:
- Publication type:
- Article
Computational intelligence anti-malware framework for android OS.
- Published in:
- Vietnam Journal of Computer Science (Springer Nature), 2017, v. 4, n. 4, p. 245, doi. 10.1007/s40595-017-0095-3
- By:
- Publication type:
- Article
Detecting Kernel-Level Rootkits Using Data Structure Invariants.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 670, doi. 10.1109/TDSC.2010.38
- By:
- Publication type:
- Article
TWO CHALLENGES OF STEALTHY HYPERVISORS DETECTION: TIME CHEATING AND DATA FLUCTUATIONS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2015, v. 10, n. 2, p. 7
- By:
- Publication type:
- Article
A FORENSIC STUDY OF THE EFFECTIVENESS OF SELECTED ANTI-VIRUS PRODUCTS AGAINST SSDT HOOKING ROOTKITS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 137
- By:
- Publication type:
- Article
A THEMATIC REVIEW OF USER COMPLIANCE WITH INFORMATION SECURITY POLICIES LITERATURE.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 101
- By:
- Publication type:
- Article