Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ifip11-9/ToddBPFSR07
%A Todd, Adam D.
%A Benson, J.
%A Peterson, Gilbert L.
%A Franz, T.
%A Stevens, M.
%A Raines, Richard A.
%B IFIP Int. Conf. Digital Forensics
%D 2007
%E Craiger, Philip
%E Shenoi, Sujeet
%I Springer
%K dblp
%P 89-105
%T Analysis of Tools for Detecting Rootkits and Hidden Processes.
%U http://dblp.uni-trier.de/db/conf/ifip11-9/df2007.html#ToddBPFSR07
%V 242
%@ 978-0-387-73741-6
@inproceedings{conf/ifip11-9/ToddBPFSR07,
added-at = {2014-12-02T00:00:00.000+0100},
author = {Todd, Adam D. and Benson, J. and Peterson, Gilbert L. and Franz, T. and Stevens, M. and Raines, Richard A.},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/2345669c0159c2808d853f9f8772709f1/dblp},
booktitle = {IFIP Int. Conf. Digital Forensics},
crossref = {conf/ifip11-9/2007},
editor = {Craiger, Philip and Shenoi, Sujeet},
ee = {http://dl.ifip.org/db/conf/ifip11-9/df2007/ToddBPFSR07.pdf},
interhash = {3a0c28fc05cdce98c7e272b5d2985e69},
intrahash = {345669c0159c2808d853f9f8772709f1},
isbn = {978-0-387-73741-6},
keywords = {dblp},
pages = {89-105},
publisher = {Springer},
series = {IFIP},
timestamp = {2016-02-02T15:05:01.000+0100},
title = {Analysis of Tools for Detecting Rootkits and Hidden Processes.},
url = {http://dblp.uni-trier.de/db/conf/ifip11-9/df2007.html#ToddBPFSR07},
volume = 242,
year = 2007
}