2004 | ||
---|---|---|
3 | EE | Sandra Ring, Eric Cole: Volatile Memory Computer Forensics to Detect Kernel Level Compromise. ICICS 2004: 158-170 |
2 | EE | Sandra Ring, David Esler, Eric Cole: Self-healing mechanisms for kernel system compromises. WOSS 2004: 100-104 |
1 | EE | Sandra Ring, Eric Cole: Taking a Lesson from Stealthy Rootkits. IEEE Security & Privacy 2(4): 38-45 (2004) |
1 | Eric Cole | [1] [2] [3] |
2 | David Esler | [2] |