Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Spybot - Search & Destroy

Known as: Spybot - Search and Destroy, Spybot SD, Spybot-Search & Destroy 
Spybot – Search & Destroy (S&D) is a spyware and adware removal computer program compatible with Microsoft Windows 95 and later. It scans the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Robots have been making inroads to human life in almost all spheres. Spybots can be immensely useful for unmanned surveillance… Expand
Is this relevant?
2015
2015
In the modern era, robots have become an integral part of human life. In a world where humans and robots need to coexist, it is… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Botnets are an emerging phenomenon that is becoming one of the most significant threats to security. Its danger lies less in the… Expand
Is this relevant?
2009
2009
Current approaches for software development fail in the integration of security aspects. Usually, this is because of the software… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2008
2008
—A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2007
2007
An in-depth understanding of botnet behavior is a precursor to building effective defenses against this serious and growing… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a "command-and… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2005
2005
This article describes an attempt to infect two new Dell WindowsXP-SP2 PCs (named Grease and Grime) with spyware and examines the… Expand
  • table 1
  • table 2
Is this relevant?
2004
2004
Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information… Expand
  • figure 2
  • table 1
  • table 1
  • figure 2
  • table 1
Is this relevant?
1996
1996
The optimum system for intercepting frequency-hopped signals uses a channelized receiver and a likelihood-ratio test (LRT… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?