To see the other types of publications on this topic, follow the link: Rootkit.

Journal articles on the topic 'Rootkit'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Rootkit.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nadim, Mohammad, Wonjun Lee, and David Akopian. "Characteristic Features of the Kernel-level Rootkit for Learning-based Detection Model Training." Electronic Imaging 2021, no. 3 (June 18, 2021): 34–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-034.

Full text
Abstract:
The core part of the operating system is the kernel, and it plays an important role in managing critical data structure resources for correct operations. The kernel-level rootkits are the most elusive type of malware that can modify the running OS kernel in order to hide its presence and perform many malicious activities such as process hiding, module hiding, network communication hiding, and many more. In the past years, many approaches have been proposed to detect kernel-level rootkit. Still, it is challenging to detect new attacks and properly categorize the kernel-level rootkits. Memory forensic approaches showed efficient results with the limitation against transient attacks. Cross-view-based and integrity monitoring-based approaches have their own weaknesses. A learning-based detection approach is an excellent way to solve these problems. In this paper, we give an insight into the kernel-level rootkit characteristic features and how the features can be represented to train learning-based models in order to detect known and unknown attacks. Our feature set combined the memory forensic, cross-view, and integrity features to train learning-based detection models. We also suggest useful tools that can be used to collect the characteristics features of the kernel-level rootkit.
APA, Harvard, Vancouver, ISO, and other styles
2

Heasman, John. "Rootkit threats." Network Security 2006, no. 1 (January 2006): 18–19. http://dx.doi.org/10.1016/s1353-4858(06)70326-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dunham, Ken. "OrderGun.A: A Sophisticated Rootkit." Information Systems Security 16, no. 2 (April 12, 2007): 123–26. http://dx.doi.org/10.1080/10658980601051763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dunham, Ken. "Year of the Rootkit." Information Systems Security 15, no. 6 (December 2006): 2–6. http://dx.doi.org/10.1080/10658980601051797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

KWON, Ohmin, Hyun KWON, and Hyunsoo YOON. "Rootkit inside GPU Kernel Execution." IEICE Transactions on Information and Systems E102.D, no. 11 (November 1, 2019): 2261–64. http://dx.doi.org/10.1587/transinf.2019edl8104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anande, T. J., T. K. Genger, and J. U. Abasiene. "Combating Kernel Rootkits on Linux Version 2.6 (Analysis of Rootkit Prevention, Detection and Correction)." International Journal of Applied Information Systems 10, no. 8 (April 6, 2016): 1–10. http://dx.doi.org/10.5120/ijais2016451540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ke Ming. "Design on Framework for Dynamic Monitoring of Virtual Machines." Applied Mechanics and Materials 530-531 (February 2014): 667–70. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.667.

Full text
Abstract:
In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.
APA, Harvard, Vancouver, ISO, and other styles
8

Josse, Sébastien. "Rootkit detection from outside the Matrix." Journal in Computer Virology 3, no. 2 (May 15, 2007): 113–23. http://dx.doi.org/10.1007/s11416-007-0045-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lacombe, Éric, Frédéric Raynal, and Vincent Nicomette. "Rootkit modeling and experiments under Linux." Journal in Computer Virology 4, no. 2 (October 25, 2007): 137–57. http://dx.doi.org/10.1007/s11416-007-0069-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hansen, Markus. "DRM-Desaster: Das Sony BMG-Rootkit." Datenschutz und Datensicherheit - DuD 30, no. 2 (February 2006): 95–97. http://dx.doi.org/10.1007/s11623-006-0026-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Case, Andrew, and Golden G. Richard. "Advancing Mac OS X rootkit detection." Digital Investigation 14 (August 2015): S25—S33. http://dx.doi.org/10.1016/j.diin.2015.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Leian, Zuanxing Yin, Yuli Shen, Haitao Lin, and Hongjiang Wang. "Research and Design of Rootkit Detection Method." Physics Procedia 33 (2012): 852–57. http://dx.doi.org/10.1016/j.phpro.2012.05.145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Desnos, Anthony, Éric Filiol, and Ivan Lefou. "Detecting (and creating !) a HVM rootkit (aka BluePill-like)." Journal in Computer Virology 7, no. 1 (September 12, 2009): 23–49. http://dx.doi.org/10.1007/s11416-009-0130-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Moon, Hyungon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, and Brent Byunghoon Kang. "Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping." IEEE Transactions on Dependable and Secure Computing 14, no. 2 (March 1, 2017): 145–57. http://dx.doi.org/10.1109/tdsc.2015.2443803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Musavi, Seyyedeh Atefeh, and Mehdi Kharrazi. "Back to Static Analysis for Kernel-Level Rootkit Detection." IEEE Transactions on Information Forensics and Security 9, no. 9 (September 2014): 1465–76. http://dx.doi.org/10.1109/tifs.2014.2337256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Embleton, Shawn, Sherri Sparks, and Cliff C. Zou. "SMM rootkit: a new breed of OS independent malware." Security and Communication Networks 6, no. 12 (December 9, 2009): 1590–605. http://dx.doi.org/10.1002/sec.166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

SUBAIRU, S. O., A. O. ISAH, and J. K. ALHASSAN. "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit." International Journal of Information Security and Cybercrime 6, no. 1 (June 29, 2017): 67–72. http://dx.doi.org/10.19107/ijisc.2017.01.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Tsaur, Woei-Jiunn. "Strengthening digital rights management using a new driver-hidden rootkit." IEEE Transactions on Consumer Electronics 58, no. 2 (May 2012): 479–83. http://dx.doi.org/10.1109/tce.2012.6227450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Muthumanickam, K., and E. Ilavarasan. "Optimization of rootkit revealing system resources – A game theoretic approach." Journal of King Saud University - Computer and Information Sciences 27, no. 4 (October 2015): 386–92. http://dx.doi.org/10.1016/j.jksuci.2014.10.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Riley, Ryan. "A framework for prototyping and testing data-only rootkit attacks." Computers & Security 37 (September 2013): 62–71. http://dx.doi.org/10.1016/j.cose.2013.04.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mahapatra, Chandrabhanu, and S. Selvakumar. "An online cross view difference and behavior based kernel rootkit detector." ACM SIGSOFT Software Engineering Notes 36, no. 4 (August 4, 2011): 1–9. http://dx.doi.org/10.1145/1988997.1989022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tian, Donghai, Rui Ma, Xiaoqi Jia, and Changzhen Hu. "A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning." IEEE Access 7 (2019): 91657–66. http://dx.doi.org/10.1109/access.2019.2928060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Choi, Ji-Won, Sang-Jun Park, Seong-Jin Byeon, and Dongho Kim. "Dual-Mode Kernel Rootkit Scan and Recovery with Process ID Brute-Force." Advanced Science Letters 23, no. 3 (March 1, 2017): 1573–77. http://dx.doi.org/10.1166/asl.2017.8624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Pardeshi, Vijay. "Securing KVM Based Virtual Machine Monitoring System for Handling and Detection of Rootkit Attack." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 1641–45. http://dx.doi.org/10.22214/ijraset.2018.4275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Waliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.

Full text
Abstract:
At this paper focus on Malicious Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successful user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Xiao, Jianbiao Zhang, Ai Zhang, and Jinchang Ren. "TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis." Mathematical Biosciences and Engineering 16, no. 4 (2019): 2650–67. http://dx.doi.org/10.3934/mbe.2019132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Shevchenko, Svitlana, Pavlo Skladannyi, and Maksym Martseniuk. "ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE." Cybersecurity: Education Science Technique, no. 4 (2019): 62–71. http://dx.doi.org/10.28925/2663-4023.2019.4.6271.

Full text
Abstract:
The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine. The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.
APA, Harvard, Vancouver, ISO, and other styles
28

Hei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.

Full text
Abstract:
Android system has been one of the main targets of hacker attacks for a long time. At present, it is faced with security risks such as privilege escalation attacks, image tampering, and malicious programs. In view of the above risks, the current detection of the application layer can no longer guarantee the security of the Android system. The security of mobile terminals needs to be fully protected from the bottom to the top, and the consistency test of the hardware system is realized from the hardware layer of the terminal. However, there is not a complete set of security measures to ensure the reliability and integrity of the Android system at present. Therefore, from the perspective of trusted computing, this paper proposes and implements a trusted static measurement method of the Android system based on TrustZone to protect the integrity of the system layer and provide a trusted underlying environment for the detection of the Android application layer. This paper analyzes from two aspects of security and efficiency. The experimental results show that this method can detect the Android system layer privilege escalation attack and discover the rootkit that breaks the integrity of the Android kernel in time during the startup process, and the performance loss of this method is within the acceptable range.
APA, Harvard, Vancouver, ISO, and other styles
29

Sulkala, Helena. ""Työpaja heitethiin yhtheiselä tansila" keelekontaktid ja meänkeel." Eesti ja soome-ugri keeleteaduse ajakiri. Journal of Estonian and Finno-Ugric Linguistics 1, no. 2 (June 17, 2010): 317–39. http://dx.doi.org/10.12697/jeful.2010.1.2.17.

Full text
Abstract:
Artiklis kirjeldatakse Põhja-Rootsis kõneldava meän-keele tekkimislugu ja selle keele praegust keelekontaktidest mõjutatud kirjalikku kuju. Vanal soome murdel põhinev meänkeel on laenanud rootsi keelest nii fonoloogilisi, morfoloogilisi, süntaktilisi kui ka leksikaalseid jooni. Saami keelte mõju ja praeguse soome kirjakeele mõju on vähesem ja raskemini märgatav. Näidetest on võimalik näha, kuidas soome ja rootsi keele jooned meänkeeles ühinevad ja kuidas meänkeele kirjakeel liigub soome kirjakeelest kaugemale mitte ainult laensõnade tõttu, vaid ka morfosüntaktiliselt.
APA, Harvard, Vancouver, ISO, and other styles
30

Khan, Riaz Ullah, Xiaosong Zhang, Rajesh Kumar, Abubakar Sharif, Noorbakhsh Amiri Golilarz, and Mamoun Alazab. "An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers." Applied Sciences 9, no. 11 (June 11, 2019): 2375. http://dx.doi.org/10.3390/app9112375.

Full text
Abstract:
In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious services on the internet. It is challenging to identify Peer-to-peer (P2P) botnets as compared to Internet Relay Chat (IRC), Hypertext Transfer Protocol (HTTP) and other types of botnets because P2P traffic has typical features of the centralization and distribution. To resolve the issues of P2P botnet identification, we propose an effective multi-layer traffic classification method by applying machine learning classifiers on features of network traffic. Our work presents a framework based on decision trees which effectively detects P2P botnets. A decision tree algorithm is applied for feature selection to extract the most relevant features and ignore the irrelevant features. At the first layer, we filter non-P2P packets to reduce the amount of network traffic through well-known ports, Domain Name System (DNS). query, and flow counting. The second layer further characterized the captured network traffic into non-P2P and P2P. At the third layer of our model, we reduced the features which may marginally affect the classification. At the final layer, we successfully detected P2P botnets using decision tree Classifier by extracting network communication features. Furthermore, our experimental evaluations show the significance of the proposed method in P2P botnets detection and demonstrate an average accuracy of 98.7%.
APA, Harvard, Vancouver, ISO, and other styles
31

Corrons, Luis, and Dominic Hoskins. "Exploring MBR rootkits." Network Security 2008, no. 3 (March 2008): 7–9. http://dx.doi.org/10.1016/s1353-4858(08)70029-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tatomur, Irina. "UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD." Economic discourse, no. 1 (March 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.

Full text
Abstract:
Introduction. With the rapid adoption of computer and networking technologies, educational institutions pay insufficient attention to the implementation of security measures to ensure the confidentiality, integrity and accessibility of data, and thus fall prey to cyber-attacks. Methods. The following methods were used in the process of writing the article: methods of generalization, analogy and logical analysis to determine and structure the motives for phishing attacks, ways to detect and prevent them; statistical analysis of data – to build a chronological sample of the world's largest cyber incidents and determine the economic losses suffered by educational institutions; graphical method – for visual presentation of results; abstraction and generalization – to make recommendations that would help reduce the number of cyber scams. Results. The article shows what role cyber security plays in counteracting phishing scams in the educational field. The motives for the implementation of phishing attacks, as well as methods for detecting and preventing them, have been identified and regulated. The following notions as "phishing", "submarine" and "whaling" are evaluated as the most dangerous types of fraud, targeting both small and large players in the information chain of any educational institution. An analytical review of the educational services market was conducted and a chronological sampling of the largest cyber incidents that occurred in the period 2010-2019 was made. The economic losses incurred by colleges, research institutions and leading universities in the world were described. It has been proven that the US and UK educational institutions have been the most attacked by attackers, somewhat inferior to Canada and countries in the Asia-Pacific region. It is found that education has become the top industry in terms of the number of Trojans detected on devices belonging to educational institutions and the second most listed among the most affected by the ransomware. A number of measures have been proposed to help reduce the number of cyber incidents. Discussion. The obtained results should be taken into account when formulating a strategy for the development of educational institutions, as well as raising the level of awareness of the representatives of the academic community in cybersecurity. Keywords: phishing, cyber security, cyber stalkers, insider threat, rootkit, backdoor.
APA, Harvard, Vancouver, ISO, and other styles
33

Arnett, Kirk P., Mark B. Schmidt, Allen C. Johnston, Jongki Kim, and Hajin Hwang. "Rootkits and What we Know." International Journal of Information Security and Privacy 1, no. 4 (October 2007): 75–86. http://dx.doi.org/10.4018/jisp.2007100105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Landi, Michael. "The Methods of Windows Rootkits." Journal of Applied Security Research 4, no. 3 (July 17, 2009): 389–426. http://dx.doi.org/10.1080/19361610902930212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Dolle, Wilhelm, and Christoph Wegener. "Windows Rootkits — eine aktuelle Bedrohung." Datenschutz und Datensicherheit - DuD 30, no. 8 (August 2006): 471–75. http://dx.doi.org/10.1007/s11623-006-0255-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Dolle, Wilhelm, and Christoph Wegener. "Windows Rootkits — und ihre Erkennung." Datenschutz und Datensicherheit - DuD 30, no. 8 (August 2006): 476–80. http://dx.doi.org/10.1007/s11623-006-0256-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Xianghe, Li, Zhang Liancheng, and Li Shuo. "Kernel rootkits implement and detection." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1473–76. http://dx.doi.org/10.1007/bf02831800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Baliga, Arati, Liviu Iftode, and Xiaoxin Chen. "Automated containment of rootkits attacks." Computers & Security 27, no. 7-8 (December 2008): 323–34. http://dx.doi.org/10.1016/j.cose.2008.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ring, S., and E. Cole. "Taking a lesson from stealthy rootkits." IEEE Security and Privacy Magazine 2, no. 4 (July 2004): 38–45. http://dx.doi.org/10.1109/msp.2004.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Laggner, Manuel, and Eckehard Hermann. "Virtualisierende Rootkits, die fast perfekte Tarnung." Datenschutz und Datensicherheit - DuD 31, no. 11 (November 2007): 822–26. http://dx.doi.org/10.1007/s11623-007-0266-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Beegle, Lynn Erla. "Rootkits and Their Effects on Information Security." Information Systems Security 16, no. 3 (June 12, 2007): 164–76. http://dx.doi.org/10.1080/10658980701402049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar, A. Arun, and Surya Prabha. "Dorsal rootlet ganglion- First report." Asian Pacific Journal of Health Sciences 5, no. 1 (March 2018): 166–68. http://dx.doi.org/10.21276/apjhs.2018.5.1.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pagé, Fernand, Bady Badibanga, Annie Sauvesty, and Colette Ansseau. "Le système radiculaire dans les érablières du Québec. I. Nouvelle méthode d'estimation du volume et de la masse des radicelles." Canadian Journal of Forest Research 22, no. 10 (October 1, 1992): 1562–67. http://dx.doi.org/10.1139/x92-207.

Full text
Abstract:
A method for rapidly estimating the rootlet volume and mass in sugar maple groves was developed in relation with the rootlet size. Soil samples were obtained with corers and cut in 2-cm thick slices. The number of rootlets of diameter classes <0.3, 0.3–0.5, 0.5–0.8, and 0.8–1.0 mm were determined under microscope (× 150) on the upper surface of slices. Rootlet surface for each class was measured on thin sections of soil, with an optic microscope connected to a digitalizing board. Mean rootlet surface [Formula: see text] showed a small standard deviation within each diameter class. The rootlet surface (S) on a surface of soil St can be estimated as [Formula: see text], where N is the number of rootlets observed in nc fields of observation, each field having a surface So. If two soil slices are located at depths h1 and h2, respectively, and if the rootlet surfaces of those slices are S1 and S2, the rootlet volume V of the first slice corresponds approximately to the volume of a truncated cone, and can be calculated as V = [S1 + S2 + (S1S2)0,5] (h2–h1)/3. The rootlet density (g•cm−3 of root) was also determined for each diameter class. The standard deviation from [Formula: see text], the mean density for each diameter class was small. Thus, the rootlet mass M was determined as [Formula: see text]. Estimated and real rootlet volume and mass values were compared. A difference of about 10% was found between estimated and real values.
APA, Harvard, Vancouver, ISO, and other styles
44

Gebhardt, Carlo, Chris I. Dalton, and Richard Brown. "Preventing hypervisor-based rootkits with trusted execution technology." Network Security 2008, no. 11 (November 2008): 7–12. http://dx.doi.org/10.1016/s1353-4858(08)70128-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Baliga, A., V. Ganapathy, and L. Iftode. "Detecting Kernel-Level Rootkits Using Data Structure Invariants." IEEE Transactions on Dependable and Secure Computing 8, no. 5 (September 2011): 670–84. http://dx.doi.org/10.1109/tdsc.2010.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Wampler, Doug, and James H. Graham. "A normality based method for detecting kernel rootkits." ACM SIGOPS Operating Systems Review 42, no. 3 (April 2008): 59–64. http://dx.doi.org/10.1145/1368506.1368515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yan, Guanglu, Senlin Luo, Fan Feng, Limin Pan, and Qamas Gul Khan Safi. "MOSKG: countering kernel rootkits with a secure paging mechanism." Security and Communication Networks 8, no. 18 (May 26, 2015): 3580–91. http://dx.doi.org/10.1002/sec.1282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Barr, D. J. S., and N. L. Désaulniers. "The flagellar apparatus in the Phytophthora infestans zoospore." Canadian Journal of Botany 68, no. 10 (October 1, 1990): 2112–18. http://dx.doi.org/10.1139/b90-276.

Full text
Abstract:
The Phytophthora infestans zoospore contains five out of six rootlets that are found in other secondary-type oomycetous zoospores. They include (i) an anterior ribbed rootlet (AR4) that runs along the right side of the anterior groove and consists of four main microtubules, an electron-opaque cord, and secondary (rib) microtubules; (ii) an anterior rootlet (A2) that runs on the left side of the anterior groove and consists of two microtubules; (iii) a posterior rootlet (P6) that runs on the left side of the posterior groove and consists of six microtubules; (iv) an array of cytoplasmic microtubules; and (v) an array of nucleus-associated microtubules. There is no multistranded, band-shaped rootlet (MS). There is a concertina-like structure in the core of the transition zone distal to the basal plate. Differences in rootlet morphology may provide a useful means of classifying species of Phytophthora. Key words: flagellar apparatus, zoospore, Phytophthora infestans, Oomycetes.
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Jun, Jiangang Gao, Michael Adamian, Xiao-Hong Wen, Basil Pawlyk, Luo Zhang, Michael J. Sanderson, Jian Zuo, Clint L. Makino, and Tiansen Li. "The Ciliary Rootlet Maintains Long-Term Stability of Sensory Cilia." Molecular and Cellular Biology 25, no. 10 (May 15, 2005): 4129–37. http://dx.doi.org/10.1128/mcb.25.10.4129-4137.2005.

Full text
Abstract:
ABSTRACT The striated ciliary rootlet is a prominent cytoskeleton originating from basal bodies of ciliated cells. Although a familiar structure in cell biology, its function has remained unresolved. In this study, we carried out targeted disruption in mice of the gene for rootletin, a component of the rootlet. In the mutant, ciliated cells are devoid of rootlets. Phototransduction and ciliary beating in sensory and motile cilia initially exhibit no apparent functional deficits. However, photoreceptors degenerate over time, and mutant lungs appear prone to pathological changes consistent with insufficient mucociliary clearance. Further analyses revealed a striking fragility at the ciliary base in photoreceptors lacking rootlets. In vitro assays suggest that the rootlet is among the least dynamic of all cytoskeletons and interacts with actin filaments. Thus, a primary function of the rootlet is to provide structural support for the cilium. Inasmuch as photoreceptors elaborate an exceptionally enlarged sensory cilium, they are especially dependent on the rootlet for structural integrity and long-term survival.
APA, Harvard, Vancouver, ISO, and other styles
50

De Bellis, P., and G. L. Ercolani. "Growth Interactions during Bacterial Colonization of Seedling Rootlets." Applied and Environmental Microbiology 67, no. 4 (April 1, 2001): 1945–48. http://dx.doi.org/10.1128/aem.67.4.1945-1948.2001.

Full text
Abstract:
ABSTRACT Rootlet elongation and bacterial growth on rootlets were determined after inoculation of cucumber and spinach seedlings withPseudomonas strains differing in production of siderophores and HCN. Siderophore producers grew more profusely than nonproducers on both species and promoted rootlet elongation on cucumber. Coinoculation of siderophore producers and nonproducers resulted in restricted growth of the latter. The total populations of nonproducers of HCN in the presence of HCN producers were not decreased, but the tenacity of their association with the rootlet surface was altered.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography