Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: September 2014
Authors: Wei Liu, Zhi Hong Tian, Wen Liang Duan, Dong Lan
[7] http://www.ibm.com/developerworks/cn/linux/l-cn-cf/
[8] Xu Tan, Yanyan Yang, The Applications of Linux Process Concealment Technology inDynamic Forensics[J]Netinfo.Security. 2012 (6): 54-56
[9] http://www.opensourceforensics.org/tools/unix.html