The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2007 vol. 5)
ISSN: 1540-7993
pp: 65-68
Richard Ford , Florida Institute of Technology
William H. Allen , Florida Institute of Technology
In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.
basic training, stealth software, passive, hooking
Richard Ford, William H. Allen, "How Not to Be Seen II: The Defenders Fight Back", IEEE Security & Privacy, vol. 5, no. , pp. 65-68, November/December 2007, doi:10.1109/MSP.2007.166
92 ms
(Ver 3.3 (11022016))