The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Spyware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2005 (55) 2006 (30) 2007 (26) 2008 (15) 2009-2011 (20) 2012-2016 (15) 2018-2022 (18) 2023 (5)
Publication types (Num. hits)
article(62) book(1) incollection(6) inproceedings(115)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 209 occurrences of 131 keywords

Results
Found 184 publication records. Showing 184 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
206Janice C. Sipior, Burke T. Ward, Georgina R. Roselli A United States perspective on the ethical and legal issues of spyware. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF trespass, privacy, ethics, law, spyware
201Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo A Stateful Approach to Spyware Detection and Removal. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
156Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang Self-Healing Spyware: Detection, and Remediation. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
156Ming-Wei Wu, Sy-Yen Kuo Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
142Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
141Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda Automated Spyware Collection and Analysis. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
126Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya SpyCon: Emulating User Activities to Detect Evasive Spyware. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
125Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan Stopping spyware at the gate: a user study of privacy, notice and spyware. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware
117Joni Mason, Marilee Tuomanen TECH spyware raid: the PEA matrix. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residential, education, spyware, adware
112Hao Wang, Somesh Jha, Vinod Ganapathy NetSpy: Automatic Generation of Spyware Signatures for NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
94Janice C. Sipior, Burke T. Ward Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Legal protection, Privacy, Trust, Spyware
87Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng Stealthy video capturer: a new video-based spyware in 3G smartphones. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3g smartphones, security, privacy, spyware
87Karen McDowell Now that we are all so well-educated about spyware, can we put the bad guys out of business? Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF antispyware, greyware, malware, spyware, bots, adware
74Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi SpyShield: Preserving Privacy from Spy Add-Ons. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
72Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson Spyware Prevention by Classifying End User License Agreements. Search on Bibsonomy New Challenges in Applied Intelligence Technologies The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EULA spyware classification prevention
67Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
65Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan Noticing notice: a large-scale experiment on the timing of software license agreements. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF end user license agreement, notice, security, privacy, timing, spyware
65Ha Jin Hwang An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware, virus, spyware, Rootkit
59Jeheon Han, Jonghoon Kwon, Heejo Lee HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52M. N. Doja 0001, Naveen Kumar 0008 Image Authentication Schemes against Key-Logger Spyware. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Romain Robbes, Michele Lanza SpyWare: a change-aware development toolset. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF modelling, visualization, program transformation, change
52Richard H. Stern FTC cracks down on spyware and PC hijacking, but not true lies. Search on Bibsonomy IEEE Micro The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50John Aycock, Heather Crawford, Rennie deGraaf Spamulator: the Internet on a laptop. Search on Bibsonomy ITiCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, simulation, internet, education, spam, spyware
50Mayuresh Ektare, Yanxia Yang The Balancing Act Between Computer Security and Convenience. Search on Bibsonomy HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF convenience, user experience, Computer security, user behavior, Spyware, Viruses
50Michael Vedders, Paul Boyum Helping students help themselves: malware removal. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, worms, virus, spyware, kiosk, black hole, VLAN
50 User Confidence-and the Software Developer. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF keylogger, trust, firewall, virus, spyware, adware
50Kevin Borders, Atul Prakash 0001 Web tap: detecting covert web traffic. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels
45Dong-Heon Kwak, Donna McAlister Kizzier, Euisung Jung Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use. Search on Bibsonomy HICSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
44Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung Disassembled code analyzer for malware (DCAM). Search on Bibsonomy IRI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Weidong Cui, Randy H. Katz, Wai-tian Tan Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Peter Clutterbuck Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, controls, risk, spyware
43Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson Detection of Spyware by Mining Executable Files. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Spyware Detection, Data Mining, Feature Extraction, Malicious Code
43Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin Against Spyware Using CAPTCHA in Graphical Password Scheme. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authentication, CAPTCHA, spyware, graphical password
37Charles D. Curran Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semiconductor technology, LED technology, herd computing, wireless technology, spyware
35Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
35Johnathon A. Mohr The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking
35Joshua Hartranft, Veronica Longenecker SafetyNET -- designing and implementing a technology support program for students. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cisco clean access, security, help desk, spyware, viruses, support tools, call tracking, student support
35Richard Ford, Sarah Gordon Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF business models, worm, virus, spyware, malicious code, adware
30Ting-Fang Yen, Michael K. Reiter Traffic Aggregation for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware prevention, Information security, reputation systems
30Huanyu Zhao, Xiaolin Li 0001 S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Martin Boldt, Bengt Carlsson Analysing Countermeasures Against Privacy-Invasive Software. Search on Bibsonomy ICSEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Martin Boldt, Bengt Carlsson Privacy-Invasive Software and Preventive Mechanisms. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Enze Liu 0001, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Muawya Naser, Qasem Abu Al-Haija Spyware Identification for Android Systems Using Fine Trees. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Muawya Naser, Hussein Albazar, Hussein Abdel-jaber Mobile Spyware Identification and Categorization: A Systematic Review. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kenneth Ward Church, Raman Chandrasekar Emerging trends: Risks 3.0 and proliferation of spyware to 50,000 cell phones. Search on Bibsonomy Nat. Lang. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Tamara N. AlMasri, Mu'awiya N. AlDalaien Detecting Spyware in Android Devices Using Random Forest. Search on Bibsonomy ACR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Enting Zhou, Yurong Liu, Hanjia Lyu, Jiebo Luo "Ban the Chinese spyware!": A Fine-Grained Analysis of Public Opinion toward Chinese Technology Companies on Reddit. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
23Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
23Majdi K. Qabalin, Muawya Naser, Mouhammd Alkasassbeh 0001 Android Spyware Detection Using Machine Learning: A Novel Dataset. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Nowshin Tasnim, Md. Musfique Anwar, Iqbal H. Sarker A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers. Search on Bibsonomy MIET (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23J. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia Technical Analysis of the NSO Group's Pegasus Spyware. Search on Bibsonomy CSCI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Thomas Sutter Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
23Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian A Data-driven Characterization of Modern Android Spyware. Search on Bibsonomy ACM Trans. Manag. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Sergii Lysenko, Kira Bobrovnikova, Peter T. Popov, Viacheslav Kharchenko, Dmytro Medzatyi Spyware Detection Technique Based on Reinforcement Learning. Search on Bibsonomy IntelITSIS The full citation details ... 2020 DBLP  BibTeX  RDF
23Haissam Badih, Benjamin Bond, Julian L. Rrushi On Second-Order Detection of Webcam Spyware. Search on Bibsonomy ICICT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Haissam Badih, Yasamin Alagrash, Julian L. Rrushi A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Rongjunchen Zhang, Xiao Chen 0002, Sheng Wen, Xi Zheng 0001, Yong Ding 0005 Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Kenneth Howah, Ritesh Chugh Do We Trust the Internet?: Ignorance and Overconfidence in Downloading and Installing Potentially Spyware-Infected Software. Search on Bibsonomy J. Glob. Inf. Manag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone Spyware Detection using Temporal Logic. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Aishwarya Afzulpurkar, Mouza Alshemaili, Khalid Samara Outgoing Data Filtration for Detecting Spyware on Personal Computers. Search on Bibsonomy EIDWT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Danial Javaheri, Mehdi Hosseinzadeh 0001, Amir Masoud Rahmani Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Rongjunchen Zhang, Xiao Chen 0002, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang 0001 Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
23Rahul Chatterjee 0001, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart The Spyware Used in Intimate Partner Violence. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Evangelos Mitakidis, Dimitrios Taketzis, Alexandros Fakis, Georgios Kambourakis SnoopyBot: An Android spyware to bridge the mixes in Tor. Search on Bibsonomy SoftCOM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Suryakanta Panda, Samrat Mondal SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack. Search on Bibsonomy IHCI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. Search on Bibsonomy ANT/SEIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor, Gloria N. Ezeh, Uchenna Hermes Diala OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama Android spyware disease and medication. Search on Bibsonomy InfoSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Ritesh Chugh, Kenneth Howah Perceived Utility as a Motivational Factor in Affecting Users' Decisions to Download and Install Potentially Spyware-Infected Software. Search on Bibsonomy AMCIS The full citation details ... 2015 DBLP  BibTeX  RDF
23Norazah Mohd Suki, Thurasamy Ramayah, Au Soo Nee, Norbayah Mohd Suki Consumer Intention to Use Anti-Spyware Software: An Application of Structural Equation Modeling. Search on Bibsonomy Int. J. Technol. Hum. Interact. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Yuan-Shun Dai, Y. P. Xiang, Yi Pan 0001 Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Taejin Kim, Jeong Hyun Yi, Changho Seo Spyware Resistant Smartphone User Authentication Scheme. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Sarang Na, Taekyoung Kwon 0002 RIK: A virtual keyboard resilient to spyware in smartphones. Search on Bibsonomy ICCE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin Against Spyware Using CAPTCHA in Graphical Password Scheme. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
23Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues A Timing Channel Spyware for the CSMA/CA Protocol. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23David A. Werden Review of Spyware and Adware by John Aycock. Search on Bibsonomy SIGACT News The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. Search on Bibsonomy SSCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Jun Fu, Huan Yang, Yiwen Liang, Chengyu Tan Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection. Search on Bibsonomy ICARIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Nary Subramanian Spyware. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Janice C. Sipior, Burke T. Ward, Georgina R. Roselli Spyware: Ethical and Legal Concerns. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Ken M. Shaurette, Thomas J. Schleppenbach Spyware. Search on Bibsonomy Encyclopedia of Information Assurance The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Niklas Lavesson, Martin Boldt, Paul Davidsson, Andreas Jacobsson Learning to detect spyware using end user license agreements. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23John Aycock Spyware and Adware Search on Bibsonomy 2011   DOI  RDF
23Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis Evaluation of a Spyware Detection System Using Thin Client Computing. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Fadel M. Adib, Hazem M. Hajj VSpyware: Spyware in VANETs. Search on Bibsonomy LCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Anil Gurung, Xin (Robert) Luo, Qinyu Liao Consumer motivations in taking action against spyware: an empirical investigation. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Haichang Gao, Xiyang Liu A new graphical password scheme against spyware by using CAPTCHA. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Sergio Castillo-Perez, Joaquín García-Alfaro Spyware-Based Menaces Against Web Applications. Search on Bibsonomy INCoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Janice C. Sipior, Burke T. Ward User perceptions of software with embedded spyware. Search on Bibsonomy J. Enterp. Inf. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Younghwa Lee, Kenneth A. Kozar An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. Search on Bibsonomy Inf. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Stefan Saroiu, Alec Wolman SpySaver: using incentives to address spyware. Search on Bibsonomy NetEcon The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Thomas F. Stafford Spyware. Search on Bibsonomy Encyclopedia of Information Ethics and Security The full citation details ... 2007 DBLP  BibTeX  RDF
23Janice C. Sipior, Burke T. Ward, Georgina R. Roselli The Ethical and Legal Concerns of Spyware. Search on Bibsonomy Information Security Management Handbook, 6th ed. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Xin (Robert) Luo, Anil Gurung Understanding Consumer Motivation for Taking Action against Spyware. Search on Bibsonomy AMCIS The full citation details ... 2007 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 184 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license