Fig. 4From: Volatile Kernel Rootkit hidden process detection in cloud computingPerformance MeasureBack to article page