|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 17 keywords
|
|
|
Results
Found 34 publication records. Showing 32 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
72 | Richard Ford, Sarah Gordon |
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
business models, worm, virus, spyware, malicious code, adware |
50 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
50 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
50 | Joni Mason, Marilee Tuomanen |
TECH spyware raid: the PEA matrix. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
residential, education, spyware, adware |
47 | Deepti Motwani, Ramchandra Adware |
Fast Charging EV Battery Technology: A Step Towards Sustainable Future. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
47 | R. H. Adware, P. P. Jagtap, J. B. Helonde |
Power System Oscillations Damping Using UPFC Damping Controller. |
ICETET |
2010 |
DBLP DOI BibTeX RDF |
|
44 | Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung |
Disassembled code analyzer for malware (DCAM). |
IRI |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Weidong Cui, Randy H. Katz, Wai-tian Tan |
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Umar Farooq, Surinder Singh Khurana, Parvinder Singh, Munish Kumar |
An Empirical Study on Detection of Android Adware Using Machine Learning Techniques. |
Multim. Tools Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
31 | Mohammed M. Alani, Ali Ismail Awad |
AdStop: Efficient flow-based mobile adware detection using machine learning. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | Xavier de Carné de Carnavalet, Mohammad Mannan |
Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
31 | Supraja Suresh, Fabio Di Troia, Katerina Potika, Mark Stamp 0001 |
An analysis of Android adware. |
J. Comput. Virol. Hacking Tech. |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Jun Gao 0001, Li Li 0029, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein |
Should You Consider Adware as Malware in Your Study? |
SANER |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Kyungmin Lee, Hyunhee Park |
Malicious Adware Detection on Android Platform using Dynamic Random Forest. |
IMIS |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann |
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. |
ESORICS (1) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Anum Javaid, Imran Rashid, Haider Abbas, Mariagrazia Fugini |
Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware. |
WETICE |
2018 |
DBLP DOI BibTeX RDF |
|
31 | David A. Werden |
Review of Spyware and Adware by John Aycock. |
SIGACT News |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Emre Erturk |
A case study in open source software security and privacy: Android adware. |
WorldCIS |
2012 |
DBLP BibTeX RDF |
|
31 | |
Adware. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | John Aycock |
Spyware and Adware |
|
2011 |
DOI RDF |
|
31 | Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson |
Accurate Adware Detection Using Opcode Sequence Extraction. |
ARES |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Hamed Haddadi, Saikat Guha 0002, Paul Francis |
Not All Adware Is Badware: Towards Privacy-Aware Advertising. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Sarah Gordon |
Fighting Spyware and Adware in the Enterprise. |
Inf. Secur. J. A Glob. Perspect. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Richard O'Hanley |
Spyware, Adware, Malware - It's All Sleazeware to Me. |
Inf. Secur. J. A Glob. Perspect. |
2005 |
DBLP DOI BibTeX RDF |
|
31 | E. Eugene Schultz |
Pandora's Box: spyware, adware, autoexecution, and NGSCB. |
Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
28 | |
User Confidence-and the Software Developer. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
keylogger, trust, firewall, virus, spyware, adware |
22 | Like Zhang, Gregory B. White |
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed S. Alam, Son Thanh Vuong |
APHIDS++: A Mobile Agent Based Intrusion Detection System. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Erin Egan, Tim Jucovy |
Building a better filter how to create a safer Internet and avoid the litigation trap. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sarah Gordon |
Understanding the Adversary: Virus Writers and Beyond. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Foreign Code Detection on the Windows/X86 Platform. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Simon Kissler, Owen Hoyt |
Using thin client technology to reduce complexity and cost. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
SunRay, library access, scientific computer lab, thin clients, kiosks |
Displaying result #1 - #32 of 32 (100 per page; Change: )
|
|