Search
Now showing items 1-1 of 1
Identifying stealth malware using CPU power consumption and learning algorithms
(Journal of Computer Security, 2018)
With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to
individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...