Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,587,338 papers from all fields of science
Search
Sign In
Create Free Account
Spyware
Known as:
Corrupt Anti-Spyware
, Btcar
, Spyware removal software
Expand
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
0x80
Agent.BTZ
AllAdvantage
Astalavista.box.sk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Enhancing mobile learning security
Shaibu Adekunle Shonola
,
M. Joy
arXiv.org
2016
Corpus ID: 42008915
Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning…
Expand
2013
2013
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans Peter Wickelgren Approach
P. Gujjar
,
Panduranga Rao
2013
Corpus ID: 8939717
Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application…
Expand
2012
2012
Security of mobile phones: Prevention methods for the spread of malware
Mohamed Ghallali
,
B. Ouahidi
International Conference on Sciences of…
2012
Corpus ID: 14750859
The work presented in this paper describes the evolution impact of mobile devices operating system's features through its…
Expand
2007
2007
Protecting Privacy Credentials from Phishing and Spyware Attacks
S. Price
IEEE SMC Information Assurance and Security…
2007
Corpus ID: 17727595
Privacy credentials, such as user identification and passwords are vulnerable to phishing and spyware attacks. Through a…
Expand
2006
2006
Analysis of the Windows Vista Security Model
M. Conover
2006
Corpus ID: 1831045
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing…
Expand
2004
2004
AskStrider: What Has Changed on My Machine Lately?
Yi-Min Wang
,
R. Roussev
,
Chad Verbowski
,
Aaron Johnson
,
David C. Ladd
2004
Corpus ID: 61639299
As computer programs grow more complex, extensible, and connected, it becomes increasingly difficult for users to understand what…
Expand
2004
2004
Spyware – the ethics of covert software
Mathias Klang
Ethics and Information Technology
2004
Corpus ID: 36085685
Many computer users are happy to be oblivious of the workings within the machine and yet on some level it is important to know…
Expand
2003
2003
Spyware: Menace, nuisance, or both?
G. Goth
IEEE Security & Privacy Magazine
2003
Corpus ID: 39381942
for its own operations, but there will be a distribution network they can share with others. There are lots of ways you can…
Expand
1979
1979
Weights of females Barnacle Geese during breeding
C. M. Lessells
,
R. Sibly
,
M. Owen
,
S. Ellis
1979
Corpus ID: 83041286
A m ong arctic geese the fem ales rely heavily on bo d y reserves during the early stages o f the breeding cycle; the b irds…
Expand
1977
1977
Preliminary observations on the nesting of Barnacle Geese in Spitsbergen
J. Dittami
,
Charles Thomforde
,
S. Kennedy
1977
Corpus ID: 88209518
The behaviour of a colony of Barnacle Geese Branta leucopsis in Svalbard was observed during the last 10 days of incubation. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE