Optimization of rootkit revealing system resources – A game theoretic approach

Article English OPEN
K. Muthumanickam; E. Ilavarasan;
  • Publisher: Elsevier BV
  • Journal: Journal of King Saud University - Computer and Information Sciences, volume 27, issue 4, pages 386-392 (issn: 1319-1578)
  • Publisher copyright policies & self-archiving
  • Identifiers: doi: 10.1016/j.jksuci.2014.10.004
  • Subject: Windows OS | Computer security | Resource optimization | Non-cooperative game theory | Rootkit | Electronic computers. Computer science | QA75.5-76.95
    acm: Software_OPERATINGSYSTEMS

Malicious rootkit is a collection of programs designed with the intent of infecting and monitoring the victim computer without the user’s permission. After the victim has been compromised, the remote attacker can easily cause further damage. In order to infect, compromi... View more
Share - Bookmark