The Community for Technology Leaders
Green Image
Issue No. 01 - January/February (2007 vol. 5)
ISSN: 1540-7993
pp: 67-69
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
ABSTRACT
In this column, the authors take a look at stealth from both a historical and a technological perspective. This is a hugely important topic, for if an unwanted computer program can't be seen, it can't be eliminated.
INDEX TERMS
malware, software stealth, active deception, passive deception
CITATION

W. H. Allen and R. Ford, "How Not to Be Seen," in IEEE Security & Privacy, vol. 5, no. , pp. 67-69, 2007.
doi:10.1109/MSP.2007.8
93 ms
(Ver 3.3 (11022016))