Author Login Editor-in-Chief Peer Review Editor Work Office Work
Stealthy Trojan Horse Detection Method Based on System Call Hook
LIANG Xiao; LI Yi-chao; CUI Jia; CAO Yue
Computer Engineering . 2007, (20): 181 -183 .  DOI: 10.3969/j.issn.1000-3428.2007.20.063