Cited By
View all- Dorner CKlausner L(2024)If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat SystemsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670433(1-11)Online publication date: 30-Jul-2024
- Gray JSgandurra DCavallaro LBlasco Alis J(2024)Identifying Authorship in Malicious Binaries: Features, Challenges & DatasetsACM Computing Surveys10.1145/365397356:8(1-36)Online publication date: 26-Mar-2024
- Liu JLiu YLi JSun WCheng JZhang RHuang XPang J(2022)Two statistical traffic features for certain APT group identificationJournal of Information Security and Applications10.1016/j.jisa.2022.10320767:COnline publication date: 1-Jun-2022
- Show More Cited By