|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13 occurrences of 13 keywords
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
199 | Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo |
A Stateful Approach to Spyware Detection and Removal. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
155 | Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang |
Self-Healing Spyware: Detection, and Remediation. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
126 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
125 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
SpyCon: Emulating User Activities to Detect Evasive Spyware. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Dong-Heon Kwak, Donna McAlister Kizzier, Euisung Jung |
Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use. |
HICSS |
2011 |
DBLP DOI BibTeX RDF |
|
44 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
44 | Martin Boldt, Bengt Carlsson |
Analysing Countermeasures Against Privacy-Invasive Software. |
ICSEA |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
34 | Khaled F. Hussain, Naveen Addulla, Sharon Rajan, Ghada S. Moussa |
Preventing the capture of sensitive information. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
anti-spyware, image security, no-capture hardware feature, security, copyright protection |
31 | Norazah Mohd Suki, Thurasamy Ramayah, Au Soo Nee, Norbayah Mohd Suki |
Consumer Intention to Use Anti-Spyware Software: An Application of Structural Equation Modeling. |
Int. J. Technol. Hum. Interact. |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Younghwa Lee, Kenneth A. Kozar |
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. |
Inf. Manag. |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ed English |
Why You Should Not Play the Numbers Game with Anti-Spyware Vendors. |
Inf. Secur. J. A Glob. Perspect. |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Younghwa Lee, Kenneth A. Kozar |
Investigating factors affecting the adoption of anti-spyware systems. |
Commun. ACM |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui |
A generic anti-spyware solution by access control list at kernel level. |
J. Syst. Softw. |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Chandra Prakash |
B-tree with fixed node size and no minimum degree. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Byte, Prefix B-tree, String B-tree, B+-tree |
29 | Keelan Cleary, Melissa E. Rycroft |
Putting out the fire before it starts: proactive technology support. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
client communication, remote detection, backup, prevention |
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|