Skip to search formSkip to main contentSkip to account menu

Spyware

Known as: Corrupt Anti-Spyware, Btcar, Spyware removal software 
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
There is widespread use of information and communications technology (ICT) in the Middle East and North African countries… 
2013
2013
Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application… 
2012
2012
False Positives (FPs) and False Negatives (FNs) happen to every Intrusion Detection/Prevention System (IDS/IPS). This work… 
Review
2011
Review
2011
Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision… 
Review
2009
Review
2009
ABSTRACT Using a conceptual model of piracy, this paper identified four categories of factors which influence consumer behavior… 
2009
2009
Botnet is one of the most recent tools used in cyber-crime including Distributed Denial of Service attacks, phishing, spamming… 
2007
2007
actions. It appears that our design is slightly more general, as our abstract actions allow programmers to define many-many… 
2006
2006
Technology is a catch-22. It makes our lives easier and more productive, but in doing so it also makes us more vulnerable to the… 
2006
2006
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing… 
1990
1990
Engraved plastic leg rings have been placed on Barnacle Geese, Bewick's Swans and Whooper Swans to facilitate long-term studies…