From post

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.

, , и . IWIA, стр. 107-128. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Detection Testing and Benchmarking Methodologies., , , , и . IWIA, стр. 63-72. IEEE Computer Society, (2003)A Methodology for Detecting and Classifying Rootkit Exploits.. Georgia Institute of Technology, Atlanta, GA, USA, (2004)base-search.net (ftgeorgiatech:oai:smartech.gatech.edu:1853/5139).The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks., , , , и . IAW, стр. 92-99. IEEE, (2003)A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table., , и . IWIA, стр. 107-128. IEEE Computer Society, (2004)Wireless Intrusion Detection and Response., , , и . IAW, стр. 68-75. IEEE, (2003)Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table., , и . ESORICS, том 3193 из Lecture Notes in Computer Science, стр. 369-384. Springer, (2004)