Year of publication
Type of material
Licence
Language
1–20 of 97 hits
Sort by:
Sort by:
-
Forensically Sound Data Acquisition in the Age of Anti-Forensic Innocence
TIBKAT | 2016|Keywords: Rootkit -
Identifying stealth malware using CPU power consumption and learning algorithms
IOS Press | 2018|Keywords: Rootkit -
The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution
Free accessBASE | 2022|Keywords: rootkit -
Data concealments with high privacy in new technology file system
Online Contents | 2015|Keywords: File rootkit -
Using Hypervisors to Overcome Structured Exception Handler Attacks
Free accessBASE | 2019|Keywords: rootkit -
Identifying parasitic malware as outliers by code clustering
IOS Press | 2020|Keywords: UEFI rootkit -
The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution
Free accessDOAJ | 2022|Keywords: rootkit -
Virtual machine based rootkits : Aufbau - Funktionsweise - Erkennung - Abwehr
TIBKAT | 2009|Keywords: Rootkit -
Data concealments with high privacy in new technology file system
Online Contents | 2015|Keywords: File rootkit -
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
Elsevier | 2011|Keywords: Rootkit -
The rootkit arsenal : escape and evasion in the dark corners of the system
TIBKAT | 2009|Keywords: Rootkit -
Revisiting the myth of Cisco IOS diversity: recent advances in reliable shellcode design
Emerald Group Publishing | 2013|Keywords: Cisco IOS rootkit -
Too young to be secure: Analysis of UEFI threats and vulnerabilities
Free accessDOAJ | 2013|Keywords: Rootkit -
The rootkit arsenal : escape and evasion in the dark corners of the system
TIBKAT | 2013|Keywords: Rootkit -
Enhancing host security using external environment sensors
Online Contents | 2011|Keywords: Rootkit -
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Free accessDOAJ | 2019|Keywords: kernel rootkit -
An emerging threat Fileless malware: a survey and research challenges
Free accessSpringer Verlag | 2020|Keywords: Rootkit
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.