• Login
    Search 
    •   Scholarly Works @ SHSU Home
    • Cyber Forensics Intelligence Center
    • Search
    •   Scholarly Works @ SHSU Home
    • Cyber Forensics Intelligence Center
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-1 of 1

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Identifying stealth malware using CPU power consumption and learning algorithms 

    Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
    With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV
     

     

    Browse

    All of Scholarly Works @ SHSUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDepartmentThis CommunityBy Issue DateAuthorsTitlesSubjectsDepartment

    My Account

    LoginRegister

    Discover

    AuthorBenton, Ryan (1)Dawson, Joel (1)Doyle, Blair A. (1)Glisson, William Bradley (1)Lucket, Patrick (1)
    McDonald, J. Todd (1)
    Subject
    Anomaly Detection (1)
    Machine Learning (1)
    Rootkit (1)
    ... View MoreDate Issued2018 (1)Department
    Computer Science (1)
    Has File(s)Yes (1)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    TDL
    Theme by 
    Atmire NV