Malware Forensics

  • Reddy N
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… There has been a new ‘stealthy’ Linux backdoor Trojan that has been discovered that bypasses the intrusion the detection system (IDS) and web application firewalls (WAF). …

Cite

CITATION STYLE

APA

Reddy, N. (2019). Malware Forensics. In Practical Cyber Forensics (pp. 277–315). Apress. https://doi.org/10.1007/978-1-4842-4460-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free