Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
System Service Descriptor Table
Known as:
SSDT
, System Service Dispatch Table
The System Service Descriptor Table (SSDT) is an internal dispatch table within Microsoft Windows. Hooking SSDT calls is often used as a technique in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Antivirus software
Dispatch table
Exploit (computer security)
Hooking
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Proactive Forensics Approach for Virtual Machines via Dynamic and Static Analysis
Bo Hu
,
Nan Li
,
Zhiyong Liu
,
Min Li
,
Chao Liu
IEEE 18th International Conference on High…
2016
Corpus ID: 15292542
Recent years witness the prevalence of IaaS (Infrastructure as a Service) cloud services. Virtual machines (VMs) are provided to…
Expand
2013
2013
A data mining based spam detection system for YouTube
Rashid Chowdury
,
Md Nuruddin
,
Monsur Adnan
,
G. Mahmud
,
R. Rahman
International Conference on Digital Information…
2013
Corpus ID: 17690924
People now feel more comfortable socializing over the internet through popular social networking and media websites than face to…
Expand
2011
2011
Natural Frequency of F.G. Rectangular Plate by Shear Deformation Theory
A. Shahrjerdi
,
F. Mustapha
,
M. Bayat
,
S. Sapuan
,
R. Zahari
,
M. Shahzamanian
International Conference on Microelectronics…
2011
Corpus ID: 137175030
Natural frequency of functionally graded (F.G.) rectangular plate is carried out by using second-order shear deformation theory…
Expand
2009
2009
Techniques of user-mode detecting System Service Descriptor Table
Jiayuan Zhang
,
Shufen Liu
,
Jun Peng
,
Aijie Guan
International Conference on Computer Supported…
2009
Corpus ID: 7877470
In order to protect System Service Descriptor Table (SSDT) and discover the hook which is hidden in kernel module, we propose two…
Expand
2009
2009
Anti-inline-hook Technique Based on SSDT-hook
W. Yue
2009
Corpus ID: 112897605
In view of the problems that current security software encountered,such as difficulties to repair,many after-effects and poor…
Expand
2006
2006
DS-CDMA downlink system capacity enhancement through interference suppression
Y. Wang
,
G. Bottomley
IEEE Transactions on Wireless Communications
2006
Corpus ID: 206821821
In the downlink of direct-sequence code-division multiple-access (DS-CDMA) cellular systems, system capacity is limited by…
Expand
2006
2006
On the impact of soft handoff threshold and maximum size of the active Group on BS transmit power in the UMTS system
D. Avidor
,
S. Mukherjee
,
N. Hegde
IEEE Transactions on Vehicular Technology
2006
Corpus ID: 35458675
This paper investigates the effect of two control parameters of the Universal Mobile Telecommunications System (UMTS) handoff…
Expand
Highly Cited
2004
Highly Cited
2004
N-type Schottky barrier source/drain MOSFET using ytterbium silicide
Shiyang Zhu
,
Jingde Chen
,
+7 authors
D. Kwong
IEEE Electron Device Letters
2004
Corpus ID: 40155006
Ytterbium silicide, for the first time, was used to form the Schottky barrier source/drain (S/D) of N-channel MOSFETs. The device…
Expand
2003
2003
Performance comparisons of power allocation mechanisms for downlink handoff in the WCDMA system with microcellular environments
Li-Chun Wang
,
M. Chiang
,
Lei-Fone Chen
,
Chung-Ju Chang
,
C. Liao
International Conference on Modeling, Analysis…
2003
Corpus ID: 15287686
This paper investigates different power allocation algorithms for downlink handoff in the wideband code division multiple access…
Expand
2001
2001
A comparative study of power control strategies for soft handover in UTRA FDD WCDMA system
S. Akhtar
,
S. Malik
,
D. Zeghlache
IEEE VTS 53rd Vehicular Technology Conference…
2001
Corpus ID: 62177631
This paper analyzes the potential benefits of using different schemes to control base station power during soft handover for UTRA…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE