Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2075
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSubairu, S. O-
dc.contributor.authorIsah, A. O-
dc.contributor.authorAlhassan, J. K.-
dc.date.accessioned2021-06-08T09:26:33Z-
dc.date.available2021-06-08T09:26:33Z-
dc.date.issued2017-06-29-
dc.identifier.citationhttps://www.ijisc.com/year-2017-issue-1-article-8/en_US
dc.identifier.issn2286-0096-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/2075-
dc.description.abstractResearchers and security expert has been vigorously on the study of malwares, great interest has been drawn to rootkits. Rootkits are a notably dangerously type of malware with the ability to cover their presence on the compromised host operating system and allow malicious recreation via spyware and other more obvious types of malware undetected. Once a rootkit gained access to a system, it can be very tough to track and do away with them. In this research, various antimalware tools were critically analyzed and studied to ascertain their effectiveness in combating a deadly malware called tdl-4. An analytical model developed was used to obtain all experimental results and findings which are documented for further work.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Information Security and Cybercrimeen_US
dc.relation.ispartofseriesVolume 6, Issue 1;-
dc.subjectcyber-attacks, malwareen_US
dc.titleComparative Performance Study of Antimalware Tools on TDL-4 Rootkiten_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Comparative performance study of Antimalware.pdf46.88 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.