Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,557 papers from all fields of science
Search
Sign In
Create Free Account
Spybot - Search & Destroy
Known as:
Spybot - Search and Destroy
, Spybot SD
, Spybot-Search & Destroy
Expand
Spybot – Search & Destroy (S&D) is a spyware and adware removal computer program compatible with Microsoft Windows 95 and later. It scans the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Affiliate marketing
Algorithm
Babylon
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Gesture signals processing for a silent spybot
N. SaiChinmayi
,
C. Hasitha
,
B. Sravya
,
V. K. Mittal
SPIN
2015
Corpus ID: 16426822
In the modern era, robots have become an integral part of human life. In a world where humans and robots need to coexist, it is…
Expand
2013
2013
GSM Controlled Topple Resistant Spybot
G. Pratyush
,
B. Jaganath
,
L. Prithivin
,
V. K. P. Sivraj
Texas Instruments India Educators' Conference
2013
Corpus ID: 22884893
Hostage crisis has become a common act by terrorists. Recent siege in Algeria has shook the world and the death toll still…
Expand
Review
2013
Review
2013
Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns
B. Hamid
,
Jacob Geisel
,
A. Ziani
,
J. Bruel
,
Jon Perez
SDL Forum
2013
Corpus ID: 18112236
Nowadays, many practitioners express their worries about current software engineering practices. New recommendations should be…
Expand
2009
2009
Development of Applications Based on Security Patterns
D. Serrano
,
J. Ruiz
,
A. Muñoz
,
A. Maña
,
Á. Armenteros
,
Beatriz Gallego-Nicasio Crespo
Second International Conference on Dependability
2009
Corpus ID: 24782445
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software…
Expand
Review
2009
Review
2009
Botnet: Survey and Case Study
C. Li
,
Wei Jiang
,
Xin Zou
International Conference on Innovative Computing…
2009
Corpus ID: 15735794
Botnet is a hybrid of previous threats integrated with a command and control system and hundreds of millions of computers are…
Expand
2008
2008
Detecting Bots Based on Keylogging Activities
Yousof Al-Hammadi
,
U. Aickelin
Third International Conference on Availability…
2008
Corpus ID: 352582
A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled…
Expand
Highly Cited
2007
Highly Cited
2007
Characterizing Bots' Remote Control Behavior
Elizabeth Stinson
,
John C. Mitchell
International Conference on Detection of…
2007
Corpus ID: 7066281
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command-and…
Expand
2007
2007
Characterizing the Remote Control Behavior of Bots
Elizabeth Stinson
,
John C. Mitchell
2007
Corpus ID: 13612561
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command…
Expand
2005
2005
Busting the ghost in the machine
K. Arnett
,
Mark B. Schmidt
CACM
2005
Corpus ID: 21567020
This article describes an attempt to infect two new Dell WindowsXP-SP2 PCs (named Grease and Grime) with spyware and examines the…
Expand
1996
1996
Likelihood-ratio detection of frequency-hopped signals
R. Dillard
,
G. Dillard
IEEE Transactions on Aerospace and Electronic…
1996
Corpus ID: 30626864
The optimum system for intercepting frequency-hopped signals uses a channelized receiver and a likelihood-ratio test (LRT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE