Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,299 papers from all fields of science
Search
Sign In
Create Free Account
Spyware
Known as:
Corrupt Anti-Spyware
, Btcar
, Spyware removal software
Expand
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
0x80
Agent.BTZ
AllAdvantage
Astalavista.box.sk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ICT, Social Media, and the Arab Transition to Democracy: From Venting to Acting
M. Aman
,
Tina J. Jayroe
2013
Corpus ID: 154971230
There is widespread use of information and communications technology (ICT) in the Middle East and North African countries…
Expand
2013
2013
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans Peter Wickelgren Approach
P. Gujjar
,
Panduranga Rao
2013
Corpus ID: 8939717
Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application…
Expand
2012
2012
False Positives and Negatives from Real Traffic with Intrusion Detection/Prevention Systems
Cheng-Yuan Ho
,
Ying Lin
,
Y. Lai
,
I-Wei Chen
,
Fu-Yu Wang
,
Wei-Hsuan Tai
2012
Corpus ID: 6704896
False Positives (FPs) and False Negatives (FNs) happen to every Intrusion Detection/Prevention System (IDS/IPS). This work…
Expand
Review
2011
Review
2011
Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System
Y. Kovalchuk
,
K. Mcdonald-Maier
,
G. Howells
2011
Corpus ID: 17205836
Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision…
Expand
Review
2009
Review
2009
Importance of Cultural and Risk Aspects in Music Piacy: A Cross-National Comparison among University Students
Marc Fetscherin
2009
Corpus ID: 2467083
ABSTRACT Using a conceptual model of piracy, this paper identified four categories of factors which influence consumer behavior…
Expand
2009
2009
Architecture for Applying Data Mining and Visualization on Network Flow for Botnet Traffic Detection
A. Shahrestani
,
M. Feily
,
R. Ahmad
,
S. Ramadass
International Conference on Computer Technology…
2009
Corpus ID: 14777403
Botnet is one of the most recent tools used in cyber-crime including Distributed Denial of Service attacks, phishing, spamming…
Expand
2007
2007
Composing Expressive Run-time Security Policies
Lujo Bauer
2007
Corpus ID: 18739576
actions. It appears that our design is slightly more general, as our abstract actions allow programmers to define many-many…
Expand
2006
2006
The Criminal Mind
Charlene O'Hanlon
Queue
2006
Corpus ID: 7603195
Technology is a catch-22. It makes our lives easier and more productive, but in doing so it also makes us more vulnerable to the…
Expand
2006
2006
Analysis of the Windows Vista Security Model
M. Conover
2006
Corpus ID: 1831045
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing…
Expand
1990
1990
The fate of plastic leg rings used on geese and swans
E. Rees
,
M. J. Owen
,
H. Gitay
,
S. Warren
1990
Corpus ID: 55744058
Engraved plastic leg rings have been placed on Barnacle Geese, Bewick's Swans and Whooper Swans to facilitate long-term studies…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required