Amanote Research

Amanote Research

    RegisterSign In

Transparent System Introspection in Support of Analyzing Stealthy Malware

doi 10.18130/v37027
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Kevin Leach
Publisher

University of Virginia


Related search

Visualization-Based Support of Analyzing System Behavior Based on System Call Traces

2019English

Portable Support for Transparent Thread Migration in Java

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2000English

Exploiting TLM and Object Introspection for System-Level Simulation

2006English

Transparent Support for Partial Rollback in Software Transactional Memories

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Stealthy SS7 Attacks

Journal of ICT Standardization
ManagementComputer NetworksCommunicationsComputer Science ApplicationsInnovationManagement of TechnologyInformation Systems
2017English

Towards a Mobile Malware Detection Framework With the Support of Machine Learning

Communications in Computer and Information Science
MathematicsComputer Science
2018English

Stethoscope: An Introspection

Chest
CardiologyCritical CareCardiovascular MedicineIntensive Care MedicinePulmonaryRespiratory Medicine
2019English

Time for Introspection

Chest
CardiologyCritical CareCardiovascular MedicineIntensive Care MedicinePulmonaryRespiratory Medicine
2001English

Revealing Stealthy Attacks in Control Systems

2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy