Issue No. 06 - November/December (2007 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.166
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.
basic training, stealth software, passive, hooking
R. Ford and W. H. Allen, "How Not to Be Seen II: The Defenders Fight Back," in IEEE Security & Privacy, vol. 5, no. , pp. 65-68, 2007.