메뉴 건너뛰기




Volumn , Issue 8, 2010, Pages 63-68

Rootkit detection experiment within a virtual environment

Author keywords

[No Author keywords available]

Indexed keywords


EID: 79961132329     PISSN: 13921215     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (14)
  • 3
    • 79961085118 scopus 로고    scopus 로고
    • Quality of heterogeneous mobile data services: Capabilities and end-user achievements
    • Kaunas: Technologija
    • Batkauskas V., Kajackas A. Quality of Heterogeneous Mobile Data Services: Capabilities and End-user Achievements // Electronics and Electrical Engineering. - Kaunas: Technologija, 2010. - No. 5(101). - P. 43-46.
    • (2010) Electronics and Electrical Engineering , vol.101 , Issue.5 , pp. 43-46
    • Batkauskas, V.1    Kajackas, A.2
  • 4
    • 77955436656 scopus 로고    scopus 로고
    • Battery management in wireless sensor networks
    • Kaunas: Technologija
    • Tiliute D. Battery Management in Wireless Sensor Networks // Electronics and Electrical Engineering. - Kaunas: Technologija, 2007. - No. 4(76). - P. 9-12.
    • (2007) Electronics and Electrical Engineering , vol.76 , Issue.4 , pp. 9-12
    • Tiliute, D.1
  • 5
    • 77955632799 scopus 로고    scopus 로고
    • Embedded program specialization for multiple criteria trade-offs
    • Kaunas: Technologija
    • Damaševičius R., Štuikys V., Toldinas J. Embedded Program Specialization for Multiple Criteria Trade-offs // Electronics and Electrical Engineering. Kaunas: Technologija, 2008. - No. 8(88). - P. 9-14.
    • (2008) Electronics and Electrical Engineering , vol.88 , Issue.8 , pp. 9-14
    • Damaševičius, R.1    Štuikys, V.2    Toldinas, J.3
  • 6
    • 79961043117 scopus 로고    scopus 로고
    • Application-level energy consumption in communication models for handhelds
    • Kaunas: Technologija
    • Toldinas J., Štuikys V., Damaševičius R., Ziberkas G. Application-Level Energy Consumption in Communication Models for Handhelds // Electronics and Electrical Engineering. - Kaunas: Technologija, 2009. - No. 6(94). - P. 73-76.
    • (2009) Electronics and Electrical Engineering , vol.94 , Issue.6 , pp. 73-76
    • Toldinas, J.1    Štuikys, V.2    Damaševičius, R.3    Ziberkas, G.4
  • 7
    • 79961080195 scopus 로고    scopus 로고
    • Autonomous monitoring system of environment conditions
    • Kaunas: Technologija
    • Miedzinski B., Rutecki K., Habrych M. Autonomous Monitoring System of Environment Conditions // Electronics and Electrical Engineering. - Kaunas: Technologija, 2010. - No. 5(101). - P. 63-66.
    • (2010) Electronics and Electrical Engineering , vol.101 , Issue.5 , pp. 63-66
    • Miedzinski, B.1    Rutecki, K.2    Habrych, M.3
  • 8
    • 79961082928 scopus 로고    scopus 로고
    • Power awareness experiment for crypto service-based algorithms
    • Kaunas: Technologija
    • Toldinas J., Štuikys V., Ziberkas G., Naunikas D. Power Awareness Experiment for Crypto Service-Based Algorithms // Electronics and Electrical Engineering. - Kaunas: Technologija, 2010. - No. 5(101). - P. 57-62.
    • (2010) Electronics and Electrical Engineering , vol.101 , Issue.5 , pp. 57-62
    • Toldinas, J.1    Štuikys, V.2    Ziberkas, G.3    Naunikas, D.4
  • 9
    • 84964343651 scopus 로고    scopus 로고
    • Introducing stealth malware taxonomy
    • Version 1.01
    • Rutkowska J. Introducing Stealth Malware Taxonomy // COSEINC Advanced Malware Labs, Version 1.01, 2006.
    • (2006) COSEINC Advanced Malware Labs
    • Rutkowska, J.1
  • 10
    • 78650760633 scopus 로고    scopus 로고
    • An undergraduate rootkit research project: How available? How hard? How dangerous?
    • Kennesaw, Georgia, USA
    • Bowman M., Brown H., Pitt P. An Undergraduate Rootkit Research Project: How Available? How Hard? How Dangerous? // Proc. of Information Security Curriculum Development Conference. - Kennesaw, Georgia, USA, 2007. - P. 43-48.
    • (2007) Proc. of Information Security Curriculum Development Conference , pp. 43-48
    • Bowman, M.1    Brown, H.2    Pitt, P.3
  • 12
    • 35248835511 scopus 로고    scopus 로고
    • Towards a tamper-resistant kernel rootkit detector
    • DOI 10.1145/1244002.1244070, Proceedings of the 2007 ACM Symposium on Applied Computing
    • Quinh N., Takefuji Y. Towards a Tamper-Resistant Kernel Rootkit Detector // Proc. of SAC'07. - Seoul, Korea, 2007. - P. 276-283. (Pubitemid 47568299)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 276-283
    • Quynh, N.A.1    Takefuji, Y.2
  • 13
    • 66749164664 scopus 로고    scopus 로고
    • SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
    • Vasisht V., Lee H. SHARK: Architectural Support for Autonomic Protection against Stealth by Rootkit Exploits // IEEE, 2008. - P. 106-116.
    • (2008) IEEE , pp. 106-116
    • Vasisht, V.1    Lee, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.