The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2007 vol.5)
pp: 67-69
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
In this column, the authors take a look at stealth from both a historical and a technological perspective. This is a hugely important topic, for if an unwanted computer program can't be seen, it can't be eliminated.
malware, software stealth, active deception, passive deception
Richard Ford, William H. Allen, "How Not to Be Seen", IEEE Security & Privacy, vol.5, no. 1, pp. 67-69, January/February 2007, doi:10.1109/MSP.2007.8
23 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool