Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,409,064 papers from all fields of science
Search
Sign In
Create Free Account
Spyware
Known as:
Corrupt Anti-Spyware
, Btcar
, Spyware removal software
Expand
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
0x80
Agent.BTZ
AllAdvantage
Astalavista.box.sk
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ICT, Social Media, and the Arab Transition to Democracy: From Venting to Acting
M. Aman
,
Tina J. Jayroe
2013
Corpus ID: 154971230
There is widespread use of information and communications technology (ICT) in the Middle East and North African countries…
Expand
2013
2013
A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans Peter Wickelgren Approach
P. Gujjar
,
Panduranga Rao
2013
Corpus ID: 8939717
Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application…
Expand
2013
2013
Fuzzy Similarity Measures Approach in Benchmarking Taxonomies of Threats against SMEs in Developing Economies
E. Yeboah-Boateng
2013
Corpus ID: 55781370
There are various threats that militate against SMEs in developing economies. However, most SMEs fall on the conservative "TV…
Expand
Review
2011
Review
2011
Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System
Y. Kovalchuk
,
K. Mcdonald-Maier
,
G. Howells
2011
Corpus ID: 17205836
Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision…
Expand
Review
2009
Review
2009
Importance of Cultural and Risk Aspects in Music Piacy: A Cross-National Comparison among University Students
Marc Fetscherin
2009
Corpus ID: 2467083
ABSTRACT Using a conceptual model of piracy, this paper identified four categories of factors which influence consumer behavior…
Expand
2007
2007
Protecting Privacy Credentials from Phishing and Spyware Attacks
Sean M. Price
IEEE SMC Information Assurance and Security…
2007
Corpus ID: 17727595
Privacy credentials, such as user identification and passwords are vulnerable to phishing and spyware attacks. Through a…
Expand
2007
2007
ESTIMATION OF ANNUAL ADULT SURVIVAL RATES OF BARNACLE GEESE Branta leucopsis USING MULTIPLE RESIGHTINGS OF MARKED INDIVIDUALS
Barwolt S. EBBINGEl
,
J. B. V. Biezeni
,
van der J.L.M. Voet
2007
Corpus ID: 148563814
Accuracy and feasibility of three different methods to estimate adult annual survival rates in a migratory population of Barnacle…
Expand
2006
2006
Analysis of the Windows Vista Security Model
M. Conover
2006
Corpus ID: 1831045
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing…
Expand
2005
2005
Molecular dynamics simulation of barnacle cement
Jun Yin
,
Ya-pu Zhao
,
R. Zhu
2005
Corpus ID: 55092434
2005
2005
Trusted computing and open source
D. Safford
,
Mimi Zohar
Information Security Technical Report
2005
Corpus ID: 205493234
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE