Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Potentially unwanted program
Known as:
Unwanted software bundling
, Potentially unwanted programs
, Potentially-unwanted program
Expand
A potentially unwanted program is bundled software which computer users are fooled into installing along with a wanted program. Such software can…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
AVG
Android
Antivirus software
Computer security
Expand
Broader (1)
Software distribution
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Enhancing Root Cause Analysis with Runtime Models and Interactive Visualizations
Michael Szvetits
,
Uwe Zdun
Models@run.time
2013
Corpus ID: 13106133
Recent research shows that runtime models can be used to build dynamic systems coping with changing requirements and execution…
Expand
2010
2010
Unwanted pregnancy outcomes
K. Boroumandfar
,
Z. Saghafi
,
H. Abedi
,
P. Bahadoran
2010
Corpus ID: 78722376
2008
2008
Quand l'écriture n'empêche pas les sentiments... Quelques propositions pour intégrer le lexique des sentiments dans la production de textes
F. Grossmann
,
Cristelle Cavalla
,
Boch Françoise
2008
Corpus ID: 164315413
Le travail presente ici est le prolongement d'une experimentation didactique effectuee, durant plusieurs annees, sur le theme du…
Expand
2007
2007
Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System
G. Howells
,
Evangelos Papoutsis
,
Andrew B. T. Hopkins
,
K. Mcdonald-Maier
NASA/ESA Conference on Adaptive Hardware and…
2007
Corpus ID: 11476175
Protecting hardware devices from unwanted software attacks is a current area of major security concern. Coupled with the need to…
Expand
Review
2007
Review
2007
Book Review of Cybercrime – The Reality of the Threat
Nicholas Chantler
2007
Corpus ID: 147500701
If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text…
Expand
2007
2007
Consequences of Unwanted Childbearing: A Study of Child Outcomes in Bangladesh
S. Chalasani
,
J. Casterline
,
M. Koenig
2007
Corpus ID: 59490970
The prevention of unwanted births (defined as births not wanted at the time of conception) has long been a fundamental…
Expand
2005
2005
ABORTION PREVALENCE AND SOCIO-DEMOGRAPHIC DIFFERENTIALS
A. Humayun
,
N. H. Sheikh
,
M. Ashraf
2005
Corpus ID: 73755622
This study was performed to estimate the prevalence of abortions and to evaluate its association with the socio-demographic…
Expand
2002
2002
Vortex Mask: Making 80nm contacts with a twist!
M. Levenson
,
G. Dai
,
T. Ebihara
Photomask Technology
2002
Corpus ID: 111229508
An optical vortex has a phase that spirals like a corkscrew. Since any nonzero optical amplitude must have a well-defined phase…
Expand
1999
1999
Tunisie : des élections en trompe-l'œil
S. Khiari
,
Olfa Lamloum
1999
Corpus ID: 143600240
Douze ans apres l’avenement de l’« ere nouvelle » en Tunisie, le pays offre une image paradoxale : un discours officiel qui se…
Expand
1972
1972
Family Centered Health Care--A Viable Reality? The Denver Experience.
D. Cowen
,
J. Sbarbaro
1972
Corpus ID: 71942204
AUTHOR Cowen, David L;; Sbarbaro, John A. TITLE Family Centered Health Care--A Viable Reality? The Denver Experience. INSTITUTION…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE