Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,415 papers from all fields of science
Search
Sign In
Create Free Account
Rootkit
Known as:
Bootkit
, Rootkit/archive
, Anti-rootkit
Expand
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Application programming interface
Authentication
BIOS
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
SDN-Guard: Protecting SDN controllers against SDN rootkits
Dennis Tatang
,
Florian Quinkert
,
J. Frank
,
Christian Röpke
,
Thorsten Holz
Conference on Network Function Virtualization and…
2017
Corpus ID: 61609
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center…
Expand
2017
2017
Network detection of ransomware delivered by exploit kit
P. Raunak
,
P. Krishnan
2017
Corpus ID: 67407493
Ransomware is an emerging cyber threat having a clear intention of money making in the form of ransom. This timeits not a virus…
Expand
2015
2015
Acquisition and analysis of compromised firmware using memory forensics
Johannes Stüttgen
,
Stefan Vömel
,
Michael Denzel
Digital Investigation. The International Journal…
2015
Corpus ID: 5939783
Highly Cited
2014
Highly Cited
2014
MOSES: Supporting and Enforcing Security Profiles on Smartphones
Yury Zhauniarovich
,
G. Russello
,
Mauro Conti
,
B. Crispo
,
Earlence Fernandes
IEEE Transactions on Dependable and Secure…
2014
Corpus ID: 63802008
Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power…
Expand
2013
2013
Self-Encrypting Disks pose Self-Decrypting Risks How to break Hardware-based Full Disk Encryption
Tilo Müller
,
Tobias Latzo
,
F. Freiling
,
Friedrich-Alexander
2013
Corpus ID: 53407224
Hardware-based full disk encryption (FDE) drives, such as Intel’s SSD 320 and 520 series, are widely believed to be a fast and…
Expand
2009
2009
A concise cost analysis of Internet malware
Suleyman Kondakci
Computers & security
2009
Corpus ID: 15134023
2009
2009
A decision support system for constructing an alert classification model
Nien-Yi Jan
,
Shun-Chieh Lin
,
S. Tseng
,
Nancy P. Lin
Expert systems with applications
2009
Corpus ID: 28116540
Highly Cited
2007
Highly Cited
2007
Towards a tamper-resistant kernel rootkit detector
Anh-Quynh Nguyen
,
Yoshiyasu Takefuji
ACM Symposium on Applied Computing
2007
Corpus ID: 9729388
A variety of tools and architectures have been developed to detect security violations to Operating System kernels. However, they…
Expand
2006
2006
Detection of complex cyber attacks
Ian Gregorio- de Souza
,
V. Berk
,
+4 authors
Doug Madory
SPIE Defense + Commercial Sensing
2006
Corpus ID: 51016
One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For…
Expand
1990
1990
The fingerprinted database
[] Proceedings. Sixth International Conference on…
1990
Corpus ID: 206780800
A fingerprinting database management system presents a unique version or view of the data to each user. The view contains small…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE