The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for adware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2007 (16) 2009-2023 (15) 2024 (1)
Publication types (Num. hits)
article(11) book(1) incollection(1) inproceedings(19)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 26 occurrences of 17 keywords

Results
Found 34 publication records. Showing 32 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
72Richard Ford, Sarah Gordon Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF business models, worm, virus, spyware, malicious code, adware
50Karen McDowell Now that we are all so well-educated about spyware, can we put the bad guys out of business? Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF antispyware, greyware, malware, spyware, bots, adware
50Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
50Joni Mason, Marilee Tuomanen TECH spyware raid: the PEA matrix. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residential, education, spyware, adware
47Deepti Motwani, Ramchandra Adware Fast Charging EV Battery Technology: A Step Towards Sustainable Future. Search on Bibsonomy ICCCNT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
47R. H. Adware, P. P. Jagtap, J. B. Helonde Power System Oscillations Damping Using UPFC Damping Controller. Search on Bibsonomy ICETET The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
44Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung Disassembled code analyzer for malware (DCAM). Search on Bibsonomy IRI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Weidong Cui, Randy H. Katz, Wai-tian Tan Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Umar Farooq, Surinder Singh Khurana, Parvinder Singh, Munish Kumar An Empirical Study on Detection of Android Adware Using Machine Learning Techniques. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
31Mohammed M. Alani, Ali Ismail Awad AdStop: Efficient flow-based mobile adware detection using machine learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Xavier de Carné de Carnavalet, Mohammad Mannan Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
31Supraja Suresh, Fabio Di Troia, Katerina Potika, Mark Stamp 0001 An analysis of Android adware. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Jun Gao 0001, Li Li 0029, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein Should You Consider Adware as Malware in Your Study? Search on Bibsonomy SANER The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Kyungmin Lee, Hyunhee Park Malicious Adware Detection on Android Platform using Dynamic Random Forest. Search on Bibsonomy IMIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. Search on Bibsonomy ESORICS (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Anum Javaid, Imran Rashid, Haider Abbas, Mariagrazia Fugini Ease or Privacy? A Comprehensive Analysis of Android Embedded Adware. Search on Bibsonomy WETICE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31David A. Werden Review of Spyware and Adware by John Aycock. Search on Bibsonomy SIGACT News The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Emre Erturk A case study in open source software security and privacy: Android adware. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
31 Adware. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31John Aycock Spyware and Adware Search on Bibsonomy 2011   DOI  RDF
31Raja Khurram Shahzad, Niklas Lavesson, Henric Johnson Accurate Adware Detection Using Opcode Sequence Extraction. Search on Bibsonomy ARES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Hamed Haddadi, Saikat Guha 0002, Paul Francis Not All Adware Is Badware: Towards Privacy-Aware Advertising. Search on Bibsonomy I3E The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Sarah Gordon Fighting Spyware and Adware in the Enterprise. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Richard O'Hanley Spyware, Adware, Malware - It's All Sleazeware to Me. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31E. Eugene Schultz Pandora's Box: spyware, adware, autoexecution, and NGSCB. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28 User Confidence-and the Software Developer. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF keylogger, trust, firewall, virus, spyware, adware
22Like Zhang, Gregory B. White An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mohammed S. Alam, Son Thanh Vuong APHIDS++: A Mobile Agent Based Intrusion Detection System. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Erin Egan, Tim Jucovy Building a better filter how to create a safer Internet and avoid the litigation trap. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Sarah Gordon Understanding the Adversary: Virus Writers and Beyond. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Simon Kissler, Owen Hoyt Using thin client technology to reduce complexity and cost. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SunRay, library access, scientific computer lab, thin clients, kiosks
Displaying result #1 - #32 of 32 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license