Taking a lesson from stealthy rootkits | IEEE Journals & Magazine | IEEE Xplore