The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for spyware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2002-2005 (55) 2006 (30) 2007 (26) 2008 (15) 2009-2011 (20) 2012-2016 (15) 2018-2022 (18) 2023 (5)
Publication types (Num. hits)
article(62) book(1) incollection(6) inproceedings(115)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 209 occurrences of 131 keywords

Results
Found 184 publication records. Showing 184 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin 0001, Dawn Xiaodong Song Dynamic Spyware Analysis. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2007 DBLP  BibTeX  RDF
23Johnny Lim Defeat spyware with anti-screen capture technology using visual persistence. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Ed English Why You Should Not Play the Numbers Game with Anti-Spyware Vendors. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Xin Luo A Holistic Approach for Managing Spyware. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Edward W. Felten, J. Alex Halderman Digital Rights Management, Spyware, and Security. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sony-BMG, digital rights, Sony, BMG, pretty good privacy, cryptography, VoIP, copyright protection, rootkits, rootkit, PGP
23Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu, Peng-Chu Wang, Wei-Zen Su A Surveillance Spyware Detection System Based on Data Mining Methods. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Engin Kirda, Christopher Kruegel Behavior-based Spyware Detection. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2006 DBLP  BibTeX  RDF
23Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy A Crawler-based Study of Spyware in the Web. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
23John Aycock Teaching Spam and Spyware at the University of C@1g4ry. Search on Bibsonomy CEAS The full citation details ... 2006 DBLP  BibTeX  RDF
23Daphna Weinshall Cognitive Authentication Schemes Safe Against Spyware (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Frank H. Katz Campus-wide spyware and virus removal as a method of teaching information security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security awareness programs, design, information security, information security education
23Sarah Gordon Fighting Spyware and Adware in the Enterprise. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Richard O'Hanley Spyware, Adware, Malware - It's All Sleazeware to Me. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Kyle Kucera, Michel Plaisent, Prosper Bernard, Lassana Maguiraga An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions. Search on Bibsonomy J. Enterp. Inf. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Janice C. Sipior, Burke T. Ward, Georgina R. Roselli The Ethical and Legal Concerns of Spyware. Search on Bibsonomy Inf. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Roger Thompson Why spyware poses multiple threats to security. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Lee A. Freeman, Andrew Urbaczewski Why do people hate spyware? Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Steve Gibson 0003 Spyware was inevitable. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Robin S. Poston, Thomas F. Stafford, Amy Hennington Spyware: a view from the (online) street. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Sudhindra Shukla, Fiona Fui-Hoon Nah Web browsing and spyware intrusion. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Mark B. Schmidt, Kirk P. Arnett Spyware: a little knowledge is a wonderful thing. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Younghwa Lee, Kenneth A. Kozar Investigating factors affecting the adoption of anti-spyware systems. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Merrill Warkentin, Xin (Robert) Luo, Gary F. Templeton A framework for spyware assessment. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Qing Hu 0003, Tamara Dinev Is spyware an Internet nuisance or public menace? Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Xiaoni Zhang What do consumers really know about spyware? Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Neveen Farag Awad, Kristina Fitzgerald The deceptive behaviors that offend us most about spyware. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui A generic anti-spyware solution by access control list at kernel level. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Kylie Howard, Yee Fin Lim I Spy With My Little Eye: Taking a Closer Look at Spyware. Search on Bibsonomy J. Inf. Law Technol. The full citation details ... 2005 DBLP  BibTeX  RDF
23Brian P. Briammeier, Eltayeb Salih Abuelyaman A Spyware Prevention Model: A Proactive Approach. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
23Wes Ames Understanding Spyware: Risk and Response. Search on Bibsonomy IT Prof. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Thomas F. Stafford, Andrew Urbaczewski Spyware: The Ghost in the Machine. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23James Butler, Sherri Sparks Spyware and Rootkits: The Future Convergence. Search on Bibsonomy login Usenix Mag. The full citation details ... 2004 DBLP  BibTeX  RDF
23Dawei Hong, Shushuang Man, Barbra Hawes, Manton M. Matthews A Graphical Password Scheme Strongly Resistant to Spyware. Search on Bibsonomy Security and Management The full citation details ... 2004 DBLP  BibTeX  RDF
23Tom Stafford 0001, Andrew Urbaczewski Spyware: The Ghost in the Machine. Search on Bibsonomy AMCIS The full citation details ... 2004 DBLP  BibTeX  RDF
23Stefan Saroiu, Steven D. Gribble, Henry M. Levy Measurement and Analysis of Spyware in a University Environment. Search on Bibsonomy NSDI The full citation details ... 2004 DBLP  BibTeX  RDF
23Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson 0001, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. Search on Bibsonomy LISA The full citation details ... 2004 DBLP  BibTeX  RDF
23E. Eugene Schultz Pandora's Box: spyware, adware, autoexecution, and NGSCB. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Terry Costlow In Brief - Piracy, Advertising Groups Target Spyware. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2003 DBLP  BibTeX  RDF
20Thomas F. Stafford, Robin S. Poston Online Security Threats and Computer User Intentions. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security and privacy, Spyware, Internet/Web
20Manabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi T-PIM: Trusted Password Input Method against Data Stealing Malware. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Stealing Malware, Virus, Hypervisor, Spyware
20Mosin I. Hasan, Nilesh B. Prajapati An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Psychology, Spyware, Social Engineering
20Jiang Wang 0008, Anup K. Ghosh, Yih Huang Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web browser security, honey client, virtualization, botnets, spyware, malicious code
20Khaled F. Hussain, Naveen Addulla, Sharon Rajan, Ghada S. Moussa Preventing the capture of sensitive information. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-spyware, image security, no-capture hardware feature, security, copyright protection
20Stephen G. Lewis, Sara K. Rodgers Universal imaging: revolutionizing desktop support. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF imaging, deployment, spyware, viruses, drivers, ghost, desktop support
20Ron Nichols, Karl Hassler Time To start charging for cleaning student computers? Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cleanup, spyware, charging, anti-virus
20Dario V. Forte, Cristiano Maruti, Michele R. Vetturi, Michele Zambelli SecSyslog: an Approach to Secure Logging Based on Covert Channels. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Log Correlation, Log Integrity, Covert Channel, Forensic, Spyware, Log analysis
20Laurianne McLaughlin Bot Software Spreads, Causes New Worries. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, worms, spyware, viruses, bots
15Ryan Farley, Xinyuan Wang 0005 Roving Bugnet: Distributed Surveillance Threat and Mitigation. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi Undercover: authentication usable in front of prying eyes. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multisensory processes, security, usability
15Baris Coskun, Cormac Herley Can "Something You Know" Be Saved?. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, passwords, challenge response
15Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan Expanding Malware Defense by Securing Software Installations. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Untrusted code, Software installation, Malicious code, Sandboxing
15M. Eric Johnson, Dan McGuire, Nicholas D. Willey The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
15Chandra Prakash B-tree with fixed node size and no minimum degree. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Byte, Prefix B-tree, String B-tree, B+-tree
15Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Teresa Fernandez, Michael Grinnell, Eric Weakland Poof: no more viruses. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cisco clean access, network admission control, requirements selection, transition strategy, deployment, malware, audit, virus, microsoft windows, remediation, enforcement, infection
15Takumi Endo TypeTrace. Search on Bibsonomy ACM Multimedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF typing, installation, media art
15Like Zhang, Gregory B. White An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Rui Joaquim, Carlos Ribeiro CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vote manipulation, Internet voting
15Shih-Yao Dai, Sy-Yen Kuo MAPMon: A Host-Based Malware Detection Tool. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto-Start Extensibility Point, Malware Attacking Points, Honeypot, Malicious Software, Backdoor
15Andreas Moser, Christopher Kruegel, Engin Kirda Limits of Static Analysis for Malware Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Erin Egan, Tim Jucovy Building a better filter how to create a safer Internet and avoid the litigation trap. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Sarah Gordon Understanding the Adversary: Virus Writers and Beyond. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Keelan Cleary, Melissa E. Rycroft Putting out the fire before it starts: proactive technology support. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client communication, remote detection, backup, prevention
15Roger Clarke A major impediment to B2C success is...the concept 'B2C'. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF impediments, privacy policy statements, terms of contract, privacy, marketing, adoption, eCommerce
15Michiru Tanaka, Yoshimi Teshigawara A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 Securing sensitive content in a view-only file system. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF insider abuse, virtual machines, file systems, digital rights management, information leakage
15Kevin Borders, Xin Zhao 0016, Atul Prakash 0001 Siren: Catching Evasive Malware (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15James F. Ryan, Blair L. Reid Usable Encryption Enabled by AJAX. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 Back to the Future: A Framework for Automatic Malware Removal and System Repair. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Lorrie Faith Cranor Towards usable Web privacy and security. Search on Bibsonomy WWW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Yvo Desmedt Understanding Why Some Network Protocols Are User-Unfriendly. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Takashi Yamanoue, Michio Nakanishi, Atsushi Nakamura, Izumi Fuse, Ikuya Murata, Shozo Fukada, Takahiro Tagawa, Tatsumi Takeo, Shigeto Okabe, Tsuneo Yamada Digital video clips covering computer ethics in higher education. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF education material, legal, computer ethics, computer literacy
15Jerry Ringel, Andrea L. Mox, Jason Musselman Desktop management: reeling in the great white whale. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LANDesk, SUS, centralized management, windows, active directory, desktop support, desktop computing
15Amy Magno, Thomas Bohlke From 0 - 60 in 4.2 seconds supporting the RESNET. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cleanAccess, help desk, resNet, VLAN
15Brien G. Muller, Mark A. Bauer Is your resNet support boat sinking?: try outsourcing! Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF outsource, support, students, resNet
15Dan Albrich Automating windows security: building a security CD. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated security, custom CD-ROM, scripting, patch management
15Simon Kissler, Owen Hoyt Using thin client technology to reduce complexity and cost. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SunRay, library access, scientific computer lab, thin clients, kiosks
15Bengt Carlsson, Andreas Jacobsson On Contamination in Information Ecosystems. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Mohammed S. Alam, Abhishek Gupta, Jake Wires, Son Thanh Vuong APHIDS++: Evolution of A Programmable Hybrid Intrusion Detection System. Search on Bibsonomy MATA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Norman Feske, Christian Helmuth A Nitpicker's guide to a minimal-complexity secure GUI. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Brian Gardner Bringing laptops to class: the front lines of curricular computing. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF technology, mediated, classrooms, faculty, laptops, smart
15George Lawton Invasive Software: Who's Inside Your Computer? Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #184 of 184 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license