2021
DOI: 10.1088/1742-6596/2032/1/012137
|View full text |Cite
|
Sign up to set email alerts
|

Static file analysis to detect rootkits in the system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Basic requirements for strong passwords. Uncontrolled use of passwords increases the risk of unauthorized access to information, fraudulent and other actions that can cause material damage and damage to the reputation of the enterprise [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Basic requirements for strong passwords. Uncontrolled use of passwords increases the risk of unauthorized access to information, fraudulent and other actions that can cause material damage and damage to the reputation of the enterprise [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%