How Not to Be Seen II: The Defenders Fight Back

  • Authors:
  • Richard Ford;William H. Allen

  • Affiliations:
  • Florida Institute of Technology;Florida Institute of Technology

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a previous column ("How Not to Be Seen," vol. 5, no. 1, 2007, pp. 67–69), the authors introduced readers to the varied technologies that stealthy software uses. At the end of the column, they promised to take a whirlwind look at stealth detection; this installment fulfills that obligation.