This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
How Not to Be Seen
January/February 2007 (vol. 5 no. 1)
pp. 67-69
Richard Ford, Florida Institute of Technology
William H. Allen, Florida Institute of Technology
In this column, the authors take a look at stealth from both a historical and a technological perspective. This is a hugely important topic, for if an unwanted computer program can't be seen, it can't be eliminated.
Index Terms:
malware, software stealth, active deception, passive deception
Citation:
Richard Ford, William H. Allen, "How Not to Be Seen," IEEE Security & Privacy, vol. 5, no. 1, pp. 67-69, Jan.-Feb. 2007, doi:10.1109/MSP.2007.8
Usage of this product signifies your acceptance of the Terms of Use.