… There has been a new ‘stealthy’ Linux backdoor Trojan that has been discovered that bypasses the intrusion the detection system (IDS) and web application firewalls (WAF). …
CITATION STYLE
Reddy, N. (2019). Malware Forensics. In Practical Cyber Forensics (pp. 277–315). Apress. https://doi.org/10.1007/978-1-4842-4460-9_9
Mendeley helps you to discover research relevant for your work.