"Invisible Intruders: Rootkits in Practice."

David Brumley (2015)

Details and statistics

DOI:

access: closed

type: Journal Article

metadata version: 2020-04-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics