Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Spybot - Search & Destroy
Known as:
Spybot - Search and Destroy
, Spybot SD
, Spybot-Search & Destroy
Expand
Spybot – Search & Destroy (S&D) is a spyware and adware removal computer program compatible with Microsoft Windows 95 and later. It scans the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
Affiliate marketing
Algorithm
Babylon
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Gesture signals processing for a silent spybot
N. SaiChinmayi
,
C. Hasitha
,
B. Sravya
,
V. K. Mittal
SPIN
2015
Corpus ID: 16426822
In the modern era, robots have become an integral part of human life. In a world where humans and robots need to coexist, it is…
Expand
2015
2015
A Web-Based Intelligent Spybot
P. Raj
,
Rajasree Nalumachu
,
T. Jayasri
,
Yash Mittal
,
V. K. Mittal
International Conference on Mining Intelligence…
2015
Corpus ID: 6408385
Robots have been making inroads to human life in almost all spheres. Spybots can be immensely useful for unmanned surveillance…
Expand
2013
2013
GSM Controlled Topple Resistant Spybot
G. Pratyush
,
B. Jaganath
,
L. Prithivin
,
V. K. P. Sivraj
Texas Instruments India Educators' Conference
2013
Corpus ID: 22884893
Hostage crisis has become a common act by terrorists. Recent siege in Algeria has shook the world and the death toll still…
Expand
2010
2010
A Model for Configuration Management of Open Software Systems
R. Barbuti
,
G. A. Cignoni
,
P. Milazzo
arXiv.org
2010
Corpus ID: 11703842
The article proposes a model for the configuration management of open systems. The model aims at validation of configurations…
Expand
2009
2009
Development of Applications Based on Security Patterns
D. Serrano
,
J. Ruiz
,
A. Muñoz
,
A. Maña
,
Á. Armenteros
,
Beatriz Gallego-Nicasio Crespo
Second International Conference on Dependability
2009
Corpus ID: 24782445
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software…
Expand
2007
2007
Toward Botnet Mesocosms
P. Barford
,
Michael Blodgett
Conference on Workshop on Hot Topics in…
2007
Corpus ID: 12658619
An in-depth understanding of botnet behavior is a precursor to building effective defenses against this serious and growing…
Expand
2007
2007
Characterizing the Remote Control Behavior of Bots
Elizabeth Stinson
,
John C. Mitchell
2007
Corpus ID: 13612561
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command…
Expand
2004
2004
Exploring Privacy Risks in Information Networks
A. Jacobsson
2004
Corpus ID: 106606158
Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information…
Expand
2004
2004
Cooperative S&D Regimes in the Transition to Trade Liberalization ∗
P. Conconi
,
Carlo Perroni
2004
Corpus ID: 55127924
Under existing WTO rules developing countries are granted Special and Differential (S&D) treatment, i.e. special rights and…
Expand
1996
1996
Likelihood-ratio detection of frequency-hopped signals
R. Dillard
,
G. Dillard
IEEE Transactions on Aerospace and Electronic…
1996
Corpus ID: 30626864
The optimum system for intercepting frequency-hopped signals uses a channelized receiver and a likelihood-ratio test (LRT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE