|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6 occurrences of 6 keywords
|
|
|
Results
Found 3 publication records. Showing 3 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
30 | Lujo Bauer, Jay Ligatti, David Walker 0001 |
Composing expressive runtime security policies. |
ACM Trans. Softw. Eng. Methodol. |
2009 |
DBLP DOI BibTeX RDF |
policy-specification language, policy enforcement, Policy composition |
30 | Richard H. Stern |
FTC cracks down on spyware and PC hijacking, but not true lies. |
IEEE Micro |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #3 of 3 (100 per page; Change: )
|
|