Search
Now showing items 1-1 of 1
DISTRIBUTED ON-DEMAND INTEGRITY MONITORING OF LEGACY APPLICATIONS AND RELIABLE ANALYSIS OF MIXED-MODE USER-KERNEL LEVEL ROOTKITS
(2015-12-07)
The increasing number of malicious programs has become a serious threat. The growth of malware samples has led computer security researchers to design and develop automatic malware detection and analysis tools. At the same ...