Journal articles on the topic 'Rootkit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Rootkit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nadim, Mohammad, Wonjun Lee, and David Akopian. "Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training." Electronic Imaging 2021, no. 3 (June 18, 2021): 34–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-034.
Full textHeasman, John. "Rootkit threats." Network Security 2006, no. 1 (January 2006): 18–19. http://dx.doi.org/10.1016/s1353-4858(06)70326-9.
Full textDunham, Ken. "OrderGun.A: A Sophisticated Rootkit." Information Systems Security 16, no. 2 (April 12, 2007): 123–26. http://dx.doi.org/10.1080/10658980601051763.
Full textDunham, Ken. "Year of the Rootkit." Information Systems Security 15, no. 6 (December 2006): 2–6. http://dx.doi.org/10.1080/10658980601051797.
Full textKWON, Ohmin, Hyun KWON, and Hyunsoo YOON. "Rootkit inside GPU Kernel Execution." IEICE Transactions on Information and Systems E102.D, no. 11 (November 1, 2019): 2261–64. http://dx.doi.org/10.1587/transinf.2019edl8104.
Full textAnande, T. J., T. K. Genger, and J. U. Abasiene. "Combating Kernel Rootkits on Linux Version 2.6 (Analysis of Rootkit Prevention, Detection and Correction)." International Journal of Applied Information Systems 10, no. 8 (April 6, 2016): 1–10. http://dx.doi.org/10.5120/ijais2016451540.
Full textChen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.
Full textJosse, Sébastien. "Rootkit detection from outside the Matrix." Journal in Computer Virology 3, no. 2 (May 15, 2007): 113–23. http://dx.doi.org/10.1007/s11416-007-0045-1.
Full textLacombe, Éric, Frédéric Raynal, and Vincent Nicomette. "Rootkit modeling and experiments under Linux." Journal in Computer Virology 4, no. 2 (October 25, 2007): 137–57. http://dx.doi.org/10.1007/s11416-007-0069-6.
Full textHansen, Markus. "DRM-Desaster: Das Sony BMG-Rootkit." Datenschutz und Datensicherheit - DuD 30, no. 2 (February 2006): 95–97. http://dx.doi.org/10.1007/s11623-006-0026-4.
Full textCase, Andrew, and Golden G. Richard. "Advancing Mac OS X rootkit detection." Digital Investigation 14 (August 2015): S25—S33. http://dx.doi.org/10.1016/j.diin.2015.05.005.
Full textLiu, Leian, Zuanxing Yin, Yuli Shen, Haitao Lin, and Hongjiang Wang. "Research and Design of Rootkit Detection Method." Physics Procedia 33 (2012): 852–57. http://dx.doi.org/10.1016/j.phpro.2012.05.145.
Full textDesnos, Anthony, Éric Filiol, and Ivan Lefou. "Detecting (and creating !) a HVM rootkit (aka BluePill-like)." Journal in Computer Virology 7, no. 1 (September 12, 2009): 23–49. http://dx.doi.org/10.1007/s11416-009-0130-8.
Full textMoon, Hyungon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang. "Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping." IEEE Transactions on Dependable and Secure Computing 14, no. 2 (March 1, 2017): 145–57. http://dx.doi.org/10.1109/tdsc.2015.2443803.
Full textMusavi, Seyyedeh Atefeh, and Mehdi Kharrazi. "Back to Static Analysis for Kernel-Level Rootkit Detection." IEEE Transactions on Information Forensics and Security 9, no. 9 (September 2014): 1465–76. http://dx.doi.org/10.1109/tifs.2014.2337256.
Full textEmbleton, Shawn, Sherri Sparks, and Cliff C. Zou. "SMM rootkit: a new breed of OS independent malware." Security and Communication Networks 6, no. 12 (December 9, 2009): 1590–605. http://dx.doi.org/10.1002/sec.166.
Full textSUBAIRU, S. O., A. O. ISAH, and J. K. ALHASSAN. "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit." International Journal of Information Security and Cybercrime 6, no. 1 (June 29, 2017): 67–72. http://dx.doi.org/10.19107/ijisc.2017.01.08.
Full textTsaur, Woei-Jiunn. "Strengthening digital rights management using a new driver-hidden rootkit." IEEE Transactions on Consumer Electronics 58, no. 2 (May 2012): 479–83. http://dx.doi.org/10.1109/tce.2012.6227450.
Full textMuthumanickam, K., and E. Ilavarasan. "Optimization of rootkit revealing system resources – A game theoretic approach." Journal of King Saud University - Computer and Information Sciences 27, no. 4 (October 2015): 386–92. http://dx.doi.org/10.1016/j.jksuci.2014.10.004.
Full textRiley, Ryan. "A framework for prototyping and testing data-only rootkit attacks." Computers & Security 37 (September 2013): 62–71. http://dx.doi.org/10.1016/j.cose.2013.04.006.
Full textMahapatra, Chandrabhanu, and S. Selvakumar. "An online cross view difference and behavior based kernel rootkit detector." ACM SIGSOFT Software Engineering Notes 36, no. 4 (August 4, 2011): 1–9. http://dx.doi.org/10.1145/1988997.1989022.
Full textTian, Donghai, Rui Ma, Xiaoqi Jia, and Changzhen Hu. "A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning." IEEE Access 7 (2019): 91657–66. http://dx.doi.org/10.1109/access.2019.2928060.
Full textChoi, Ji-Won, Sang-Jun Park, Seong-Jin Byeon, and Dongho Kim. "Dual-Mode Kernel Rootkit Scan and Recovery with Process ID Brute-Force." Advanced Science Letters 23, no. 3 (March 1, 2017): 1573–77. http://dx.doi.org/10.1166/asl.2017.8624.
Full textPardeshi, Vijay. "Securing KVM Based Virtual Machine Monitoring System for Handling and Detection of Rootkit Attack." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 1641–45. http://dx.doi.org/10.22214/ijraset.2018.4275.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textWang, Xiao, Jianbiao Zhang, Ai Zhang, and Jinchang Ren. "TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis." Mathematical Biosciences and Engineering 16, no. 4 (2019): 2650–67. http://dx.doi.org/10.3934/mbe.2019132.
Full textShevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.
Full textHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Full textSulkala, Helena. ""Työpaja heitethiin yhtheiselä tansila" keelekontaktid ja meänkeel." Eesti ja soome-ugri keeleteaduse ajakiri. Journal of Estonian and Finno-Ugric Linguistics 1, no. 2 (June 17, 2010): 317–39. http://dx.doi.org/10.12697/jeful.2010.1.2.17.
Full textKhan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (June 11, 2019): 2375. http://dx.doi.org/10.3390/app9112375.
Full textCorrons, Luis, and Dominic Hoskins. "Exploring MBR rootkits." Network Security 2008, no. 3 (March 2008): 7–9. http://dx.doi.org/10.1016/s1353-4858(08)70029-1.
Full textTatomur, Irina. "UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD." Economic discourse, no. 1 (March 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.
Full textArnett, Kirk P., Mark B. Schmidt, Allen C. Johnston, Jongki Kim, and Hajin Hwang. "Rootkits and What we Know." International Journal of Information Security and Privacy 1, no. 4 (October 2007): 75–86. http://dx.doi.org/10.4018/jisp.2007100105.
Full textLandi, Michael. "The Methods of Windows Rootkits." Journal of Applied Security Research 4, no. 3 (July 17, 2009): 389–426. http://dx.doi.org/10.1080/19361610902930212.
Full textDolle, Wilhelm, and Christoph Wegener. "Windows Rootkits — eine aktuelle Bedrohung." Datenschutz und Datensicherheit - DuD 30, no. 8 (August 2006): 471–75. http://dx.doi.org/10.1007/s11623-006-0255-6.
Full textDolle, Wilhelm, and Christoph Wegener. "Windows Rootkits — und ihre Erkennung." Datenschutz und Datensicherheit - DuD 30, no. 8 (August 2006): 476–80. http://dx.doi.org/10.1007/s11623-006-0256-5.
Full textXianghe, Li, Zhang Liancheng, and Li Shuo. "Kernel rootkits implement and detection." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1473–76. http://dx.doi.org/10.1007/bf02831800.
Full textBaliga, Arati, Liviu Iftode, and Xiaoxin Chen. "Automated containment of rootkits attacks." Computers & Security 27, no. 7-8 (December 2008): 323–34. http://dx.doi.org/10.1016/j.cose.2008.06.003.
Full textRing, S., and E. Cole. "Taking a lesson from stealthy rootkits." IEEE Security and Privacy Magazine 2, no. 4 (July 2004): 38–45. http://dx.doi.org/10.1109/msp.2004.57.
Full textLaggner, Manuel, and Eckehard Hermann. "Virtualisierende Rootkits, die fast perfekte Tarnung." Datenschutz und Datensicherheit - DuD 31, no. 11 (November 2007): 822–26. http://dx.doi.org/10.1007/s11623-007-0266-y.
Full textBeegle, Lynn Erla. "Rootkits and Their Effects on Information Security." Information Systems Security 16, no. 3 (June 12, 2007): 164–76. http://dx.doi.org/10.1080/10658980701402049.
Full textKumar, A. Arun, and Surya Prabha. "Dorsal rootlet ganglion- First report." Asian Pacific Journal of Health Sciences 5, no. 1 (March 2018): 166–68. http://dx.doi.org/10.21276/apjhs.2018.5.1.37.
Full textPagé, Fernand, Bady Badibanga, Annie Sauvesty, and Colette Ansseau. "Le système radiculaire dans les érablières du Québec. I. Nouvelle méthode d'estimation du volume et de la masse des radicelles." Canadian Journal of Forest Research 22, no. 10 (October 1, 1992): 1562–67. http://dx.doi.org/10.1139/x92-207.
Full textGebhardt, Carlo, Chris I. Dalton, and Richard Brown. "Preventing hypervisor-based rootkits with trusted execution technology." Network Security 2008, no. 11 (November 2008): 7–12. http://dx.doi.org/10.1016/s1353-4858(08)70128-4.
Full textBaliga, A., V. Ganapathy, and L. Iftode. "Detecting Kernel-Level Rootkits Using Data Structure Invariants." IEEE Transactions on Dependable and Secure Computing 8, no. 5 (September 2011): 670–84. http://dx.doi.org/10.1109/tdsc.2010.38.
Full textWampler, Doug, and James H. Graham. "A normality based method for detecting kernel rootkits." ACM SIGOPS Operating Systems Review 42, no. 3 (April 2008): 59–64. http://dx.doi.org/10.1145/1368506.1368515.
Full textYan, Guanglu, Senlin Luo, Fan Feng, Limin Pan, and Qamas Gul Khan Safi. "MOSKG: countering kernel rootkits with a secure paging mechanism." Security and Communication Networks 8, no. 18 (May 26, 2015): 3580–91. http://dx.doi.org/10.1002/sec.1282.
Full textBarr, D. J. S., and N. L. Désaulniers. "The flagellar apparatus in the Phytophthora infestans zoospore." Canadian Journal of Botany 68, no. 10 (October 1, 1990): 2112–18. http://dx.doi.org/10.1139/b90-276.
Full textYang, Jun, Jiangang Gao, Michael Adamian, Xiao-Hong Wen, Basil Pawlyk, Luo Zhang, Michael J. Sanderson, Jian Zuo, Clint L. Makino, and Tiansen Li. "The Ciliary Rootlet Maintains Long-Term Stability of Sensory Cilia." Molecular and Cellular Biology 25, no. 10 (May 15, 2005): 4129–37. http://dx.doi.org/10.1128/mcb.25.10.4129-4137.2005.
Full textDe Bellis, P., and G. L. Ercolani. "Growth Interactions during Bacterial Colonization of Seedling Rootlets." Applied and Environmental Microbiology 67, no. 4 (April 1, 2001): 1945–48. http://dx.doi.org/10.1128/aem.67.4.1945-1948.2001.
Full text