Author:
Liang Bin,You Wei,Shi Wenchang,Liang Zhaohui
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Rootkit Detection Mechanisms for Linux Systems;2023 9th International Conference on Computer and Communications (ICCC);2023-12-08
2. Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots;25th International Symposium on Research in Attacks, Intrusions and Defenses;2022-10-26
3. Phase space power analysis for PC-based rootkit detection;Proceedings of the ACM Southeast Conference;2022-04-18
4. Heterogeneous Architectures: Malware and Countermeasures;Secure System Design and Trustable Computing;2016
5. Exploring Efficient and Robust Virtual Machine Introspection Techniques;Algorithms and Architectures for Parallel Processing;2015