Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
206 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
A United States perspective on the ethical and legal issues of spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 738-743, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trespass, privacy, ethics, law, spyware |
201 | Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo |
A Stateful Approach to Spyware Detection and Removal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, pp. 173-182, 2006, IEEE Computer Society, 0-7695-2724-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
156 | Ming-Wei Wu, Yi-Min Wang, Sy-Yen Kuo, Yennun Huang |
Self-Healing Spyware: Detection, and Remediation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 56(4), pp. 588-596, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
156 | Ming-Wei Wu, Sy-Yen Kuo |
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 275-281, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
142 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 136-141, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
141 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 202-217, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
126 | Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
SpyCon: Emulating User Activities to Detect Evasive Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 502-509, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
125 | Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan |
Stopping spyware at the gate: a user study of privacy, notice and spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 43-52, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware |
117 | Joni Mason, Marilee Tuomanen |
TECH spyware raid: the PEA matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 205-206, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
residential, education, spyware, adware |
112 | Hao Wang, Somesh Jha, Vinod Ganapathy |
NetSpy: Automatic Generation of Spyware Signatures for NIDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 99-108, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
94 | Janice C. Sipior, Burke T. Ward |
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 10(1), pp. 3-18, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Legal protection, Privacy, Trust, Spyware |
87 | Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng |
Stealthy video capturer: a new video-based spyware in 3G smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 69-78, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
3g smartphones, security, privacy, spyware |
87 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 235-239, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
74 | Zhuowei Li 0001, XiaoFeng Wang 0001, Jong Youl Choi |
SpyShield: Preserving Privacy from Spy Add-Ons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 296-316, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Niklas Lavesson, Paul Davidsson, Martin Boldt, Andreas Jacobsson |
Spyware Prevention by Classifying End User License Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Challenges in Applied Intelligence Technologies ![In: New Challenges in Applied Intelligence Technologies, pp. 373-382, 2008, Springer, 978-3-540-79354-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
EULA spyware classification prevention |
67 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 67-76, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan |
Noticing notice: a large-scale experiment on the timing of software license agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 607-616, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
end user license agreement, notice, security, privacy, timing, spyware |
65 | Ha Jin Hwang |
An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on Rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 887-894, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware, virus, spyware, Rootkit |
59 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 669-673, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | M. N. Doja 0001, Naveen Kumar 0008 |
Image Authentication Schemes against Key-Logger Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 574-579, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
52 | Romain Robbes, Michele Lanza |
SpyWare: a change-aware development toolset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 847-850, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
modelling, visualization, program transformation, change |
52 | Richard H. Stern |
FTC cracks down on spyware and PC hijacking, but not true lies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 25(1), pp. 7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | John Aycock, Heather Crawford, Rennie deGraaf |
Spamulator: the Internet on a laptop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain, June 30 - July 2, 2008, pp. 142-147, 2008, ACM, 978-1-60558-078-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, internet, education, spam, spyware |
50 | Mayuresh Ektare, Yanxia Yang |
The Balancing Act Between Computer Security and Convenience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (1) ![In: Human-Computer Interaction. Interaction Design and Usability, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I, pp. 731-735, 2007, Springer, 978-3-540-73104-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
convenience, user experience, Computer security, user behavior, Spyware, Viruses |
50 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 411-414, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
50 | |
User Confidence-and the Software Developer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(6), pp. 5-8, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
keylogger, trust, firewall, virus, spyware, adware |
50 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 110-120, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
45 | Dong-Heon Kwak, Donna McAlister Kizzier, Euisung Jung |
Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), Proceedings, 4-7 January 2011, Koloa, Kauai, HI, USA, pp. 1-10, 2011, IEEE Computer Society, 978-0-7695-4282-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
44 | Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung |
Disassembled code analyzer for malware (DCAM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IRI ![In: Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, IRI - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, USA, pp. 398-403, 2005, IEEE Systems, Man, and Cybernetics Society, 0-7803-9093-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Weidong Cui, Randy H. Katz, Wai-tian Tan |
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA, pp. 361-370, 2005, IEEE Computer Society, 0-7695-2461-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Peter Clutterbuck |
Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 859-864, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, controls, risk, spyware |
43 | Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson |
Detection of Spyware by Mining Executable Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 295-302, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Spyware Detection, Data Mining, Feature Extraction, Malicious Code |
43 | Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin |
Against Spyware Using CAPTCHA in Graphical Password Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010, pp. 760-767, 2010, IEEE Computer Society, 978-0-7695-4018-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authentication, CAPTCHA, spyware, graphical password |
37 | Charles D. Curran |
Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(3), pp. 45-51, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(9), pp. 20-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
semiconductor technology, LED technology, herd computing, wireless technology, spyware |
35 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 116-127, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
35 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 257-262, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
35 | Joshua Hartranft, Veronica Longenecker |
SafetyNET -- designing and implementing a technology support program for students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 141-142, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cisco clean access, security, help desk, spyware, viruses, support tools, call tracking, student support |
35 | Richard Ford, Sarah Gordon |
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, pp. 3-10, 2006, ACM, 978-1-59593-923-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
business models, worm, virus, spyware, malicious code, adware |
30 | Ting-Fang Yen, Michael K. Reiter |
Traffic Aggregation for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 207-227, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 142-157, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
30 | Huanyu Zhao, Xiaolin Li 0001 |
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 467-472, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson |
Analysing Countermeasures Against Privacy-Invasive Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 61, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Martin Boldt, Bengt Carlsson |
Privacy-Invasive Software and Preventive Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 21, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Foreign Code Detection on the Windows/X86 Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 279-288, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis |
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 363-375, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Enze Liu 0001, Sumanth Rao, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy |
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2023(1), pp. 207-224, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Muawya Naser, Qasem Abu Al-Haija |
Spyware Identification for Android Systems Using Fine Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(2), pp. 102, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Muawya Naser, Hussein Albazar, Hussein Abdel-jaber |
Mobile Spyware Identification and Categorization: A Systematic Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 47(8), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Ward Church, Raman Chandrasekar |
Emerging trends: Risks 3.0 and proliferation of spyware to 50,000 cell phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Lang. Eng. ![In: Nat. Lang. Eng. 29(3), pp. 824-841, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Tamara N. AlMasri, Mu'awiya N. AlDalaien |
Detecting Spyware in Android Devices Using Random Forest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACR ![In: Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), Orlando, FL, USA, 8-10 May 2023, pp. 294-315, 2023, Springer, 978-3-031-33742-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Enting Zhou, Yurong Liu, Hanjia Lyu, Jiebo Luo |
"Ban the Chinese spyware!": A Fine-Grained Analysis of Public Opinion toward Chinese Technology Companies on Reddit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.05538, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava |
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.01348, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Majdi K. Qabalin, Muawya Naser, Mouhammd Alkasassbeh 0001 |
Android Spyware Detection Using Machine Learning: A Novel Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(15), pp. 5765, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Nowshin Tasnim, Md. Musfique Anwar, Iqbal H. Sarker |
A Stacked Ensemble Spyware Detection Model Using Hyper-Parameter Tuned Tree Based Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIET (2) ![In: Machine Intelligence and Emerging Technologies - First International Conference, MIET 2022, Noakhali, Bangladesh, September 23-25, 2022, Proceedings, Part II, pp. 397-408, 2022, Springer, 978-3-031-34621-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | J. D. Rudie, Zach Katz, Sam Kuhbander, Suman Bhunia |
Technical Analysis of the NSO Group's Pegasus Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCI ![In: International Conference on Computational Science and Computational Intelligence, CSCI 2021, Las Vegas, NV, USA, December 15-17, 2021, pp. 747-752, 2021, IEEE, 978-1-6654-5841-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Sutter |
Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.14117, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian |
A Data-driven Characterization of Modern Android Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Manag. Inf. Syst. ![In: ACM Trans. Manag. Inf. Syst. 11(1), pp. 4:1-4:38, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Sergii Lysenko, Kira Bobrovnikova, Peter T. Popov, Viacheslav Kharchenko, Dmytro Medzatyi |
Spyware Detection Technique Based on Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IntelITSIS ![In: Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, Khmelnytskyi, Ukraine, June 10-12, 2020., pp. 307-316, 2020, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Haissam Badih, Benjamin Bond, Julian L. Rrushi |
On Second-Order Detection of Webcam Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICT ![In: 3rd International Conference on Information and Computer Technologies, ICICT 2020, San Jose, CA, USA, March 9-12, 2020, pp. 424-431, 2020, IEEE, 978-1-7281-7283-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Haissam Badih, Yasamin Alagrash, Julian L. Rrushi |
A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, pp. 593-600, 2020, IEEE, 978-1-7281-6609-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Rongjunchen Zhang, Xiao Chen 0002, Sheng Wen, Xi Zheng 0001, Yong Ding 0005 |
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 153542-153554, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Kenneth Howah, Ritesh Chugh |
Do We Trust the Internet?: Ignorance and Overconfidence in Downloading and Installing Potentially Spyware-Infected Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Glob. Inf. Manag. ![In: J. Glob. Inf. Manag. 27(3), pp. 87-100, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
Spyware Detection using Temporal Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019., pp. 690-699, 2019, SciTePress, 978-989-758-359-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Salma Elmalaki 0001, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry, Mani B. Srivastava |
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy Workshops ![In: 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 163-168, 2019, IEEE, 978-1-7281-3508-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Aishwarya Afzulpurkar, Mouza Alshemaili, Khalid Samara |
Outgoing Data Filtration for Detecting Spyware on Personal Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: Advances in Internet, Data and Web Technologies, The 7th International Conference on Emerging Internet, Data and Web Technologies, EIDWT-2019s, Fujairah Campus, United Arab Emirates, 26-28 February 2019., pp. 355-362, 2019, Springer, 978-3-030-12838-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Danial Javaheri, Mehdi Hosseinzadeh 0001, Amir Masoud Rahmani |
Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 78321-78332, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Rongjunchen Zhang, Xiao Chen 0002, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang 0001 |
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1805.06187, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Rahul Chatterjee 0001, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, Thomas Ristenpart |
The Spyware Used in Intimate Partner Violence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 441-458, 2018, IEEE Computer Society, 978-1-5386-4353-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Evangelos Mitakidis, Dimitrios Taketzis, Alexandros Fakis, Georgios Kambourakis |
SnoopyBot: An Android spyware to bridge the mixes in Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftCOM ![In: 24th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2016, Split, Croatia, September 22-24, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-2578-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Suryakanta Panda, Samrat Mondal |
SG-PASS: A Safe Graphical Password Scheme to Resist Shoulder Surfing and Spyware Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHCI ![In: Intelligent Human Computer Interaction - 8th International Conference, IHCI 2016, Pilani, India, December 12-13, 2016, Proceedings, pp. 27-38, 2016, Springer, 978-3-319-52502-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Huda Abualola, Hessa Alhawai, Maha Kadadha, Hadi Otrok, Azzam Mourad |
An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANT/SEIT ![In: The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) / The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) / Affiliated Workshops, May 23-26, 2016, Madrid, Spain, pp. 465-471, 2016, Elsevier. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ifeyinwa Eucharia Achumba, Kennedy Chinedu Okafor, Gloria N. Ezeh, Uchenna Hermes Diala |
OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 7(2), pp. 31-52, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Mustafa Hassan Saad, Ahmed Serageldin, Goda Ismaeel Salama |
Android spyware disease and medication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSec ![In: 2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015, pp. 118-125, 2015, IEEE, 978-1-4673-6988-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Ritesh Chugh, Kenneth Howah |
Perceived Utility as a Motivational Factor in Affecting Users' Decisions to Download and Install Potentially Spyware-Infected Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: 21st Americas Conference on Information Systems, AMCIS 2015, Puerto Rico, August 13-15, 2015, 2015, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Norazah Mohd Suki, Thurasamy Ramayah, Au Soo Nee, Norbayah Mohd Suki |
Consumer Intention to Use Anti-Spyware Software: An Application of Structural Equation Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Technol. Hum. Interact. ![In: Int. J. Technol. Hum. Interact. 10(3), pp. 19-31, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Yuan-Shun Dai, Y. P. Xiang, Yi Pan 0001 |
Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus, and Fishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 9(1), pp. 4:1-4:20, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Taejin Kim, Jeong Hyun Yi, Changho Seo |
Spyware Resistant Smartphone User Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 10, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Sarang Na, Taekyoung Kwon 0002 |
RIK: A virtual keyboard resilient to spyware in smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2014, Las Vegas, NV, USA, January 10-13, 2014, pp. 21-22, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin |
Against Spyware Using CAPTCHA in Graphical Password Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1305.7485, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
23 | Negar Kiyavash, Farinaz Koushanfar, Todd P. Coleman, Mavis Rodrigues |
A Timing Channel Spyware for the CSMA/CA Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(3), pp. 477-487, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | David A. Werden |
Review of Spyware and Adware by John Aycock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGACT News ![In: SIGACT News 44(1), pp. 17-19, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi |
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings, pp. 262-271, 2013, Springer, 978-3-642-40575-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Jun Fu, Huan Yang, Yiwen Liang, Chengyu Tan |
Bait a Trap: Introducing Natural Killer Cells to Artificial Immune System for Spyware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems - 11th International Conference, ICARIS 2012, Taormina, Italy, August 28-31, 2012. Proceedings, pp. 125-138, 2012, Springer, 978-3-642-33756-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Nary Subramanian |
Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1246-1248, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
Spyware: Ethical and Legal Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Ken M. Shaurette, Thomas J. Schleppenbach |
Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Assurance ![In: Encyclopedia of Information Assurance, 2011, Taylor & Francis, 1-4200-6620-X. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Niklas Lavesson, Martin Boldt, Paul Davidsson, Andreas Jacobsson |
Learning to detect spyware using end user license agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 26(2), pp. 285-307, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | John Aycock |
Spyware and Adware ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
DOI RDF |
|
23 | Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis |
Evaluation of a Spyware Detection System Using Thin Client Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers, pp. 222-232, 2010, Springer, 978-3-642-24208-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Fadel M. Adib, Hazem M. Hajj |
VSpyware: Spyware in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings, pp. 621-624, 2010, IEEE Computer Society, 978-1-4244-8387-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Anil Gurung, Xin (Robert) Luo, Qinyu Liao |
Consumer motivations in taking action against spyware: an empirical investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. Comput. Secur. ![In: Inf. Manag. Comput. Secur. 17(3), pp. 276-289, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Haichang Gao, Xiyang Liu |
A new graphical password scheme against spyware by using CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Sergio Castillo-Perez, Joaquín García-Alfaro |
Spyware-Based Menaces Against Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 1st International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009, Barcelona, Spain, 4-6 November 2009, pp. 409-412, 2009, IEEE Computer Society, 978-1-4244-5165-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward |
User perceptions of software with embedded spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Enterp. Inf. Manag. ![In: J. Enterp. Inf. Manag. 21(1), pp. 13-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Younghwa Lee, Kenneth A. Kozar |
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Manag. ![In: Inf. Manag. 45(2), pp. 109-119, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Saroiu, Alec Wolman |
SpySaver: using incentives to address spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetEcon ![In: Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008, pp. 37-42, 2008, ACM, 978-1-60558-179-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Thomas F. Stafford |
Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Information Ethics and Security ![In: Encyclopedia of Information Ethics and Security, pp. 616-621, 2007, IGI Global, 9781591409885. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
The Ethical and Legal Concerns of Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Security Management Handbook, 6th ed. ![In: Information security management handbook, Sixth Edition., pp. 659-671, 2007, Auerbach Publ./CRC Press, 978-0-8493-7495-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Xin (Robert) Luo, Anil Gurung |
Understanding Consumer Motivation for Taking Action against Spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMCIS ![In: Reaching New Heights. 13th Americas Conference on Information Systems, AMCIS 2007, Keystone, Colorado, USA, August 9-12, 2007, pp. 143, 2007, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|