Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-1 of 1 total results
Journal of Mobile, Embedded and Distributed Systems - JMEDS
Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel.