Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Spyware

Known as: Corrupt Anti-Spyware, Btcar, Spyware removal software 
Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Survivors of intimate partner violence increasingly report that abusers install spyware on devices to track their location… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2008
Highly Cited
2008
We performed an empirical investigation of factors affecting an individual's decision to adopt anti-spyware software. Our results… Expand
Highly Cited
2007
Highly Cited
2007
Spyware is a class of malicious code that is surreptitiously installed on victims' machines. Once active, it silently monitors… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
2007
Highly Cited
2007
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Highly Cited
2007
Highly Cited
2007
Web 2.0, the second phase in the Web's evolution, is attracting the attention of IT professionals, businesses, and Web users. Web… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Highly Cited
2007
Highly Cited
2007
Software evolution research is limited by the amount of information available to researchers: Current version control tools do… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Highly Cited
2006
Highly Cited
2006
  • D. Weinshall
  • IEEE Symposium on Security and Privacy (S&P'06)
  • 2006
  • Corpus ID: 267586
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Highly Cited
2006
Highly Cited
2006
Malicious spyware poses a significant threat to desktop security and integrity. This paper examines that threat from an Internet… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Highly Cited
2006
Highly Cited
2006
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Highly Cited
2005
Highly Cited
2005
Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3