Fig. 2From: Volatile Kernel Rootkit hidden process detection in cloud computingDeployment of Volatile Kernel Rootkit Hidden Process Detection View (VKRHPDV)Back to article page