Article,

A Brief Survey on Rootkit Techniques in Malicious Codes.

, , , , and .
J. Internet Serv. Inf. Secur., 2 (3/4): 134-147 (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews