|
Volumn , Issue , 2004, Pages 15-21
|
Application of a methodology to characterize rootkits retrieved from honeynets
|
Author keywords
Forensics; Honeynet; Rootkits; Signatures
|
Indexed keywords
COMPUTER OPERATING SYSTEMS;
COMPUTER SYSTEMS;
DATA PRIVACY;
DATA PROCESSING;
INFORMATION MANAGEMENT;
SECURITY OF DATA;
FORENSICS;
HONEYNET;
NETWORK SECURITY;
ROOTKITS;
SIGNATURES;
COMPUTER NETWORKS;
|
EID: 15944384236
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (10)
|
References (16)
|