Application of a methodology to characterize rootkits retrieved from honeynets | IEEE Conference Publication | IEEE Xplore