Now showing items 1-1 of 1

    • Identifying stealth malware using CPU power consumption and learning algorithms 

      Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
      With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...