A framework for spyware assessment
Communications of the ACM - Spyware
Impact of Trust Belief on Download Intention of Bundled Freeware
Proceedings of the 11th International Conference on Electronic Commerce
Preventing privacy-invasive software using collaborative reputation systems
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Attacking confidentiality: an agent based approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Spyware can sneak onto systems, monitoring them, capturing user data, and transmitting it to third parties. Find out how it works and how to guard against it.