Journal articles on the topic 'Spyware (Computer software)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 43 journal articles for your research on the topic 'Spyware (Computer software).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Suki, Norazah Mohd, T. Ramayah, Au Soo Nee, and Norbayah Mohd Suki. "Consumer Intention to Use Anti-Spyware Software." International Journal of Technology and Human Interaction 10, no. 3 (July 2014): 19–31. http://dx.doi.org/10.4018/ijthi.2014070102.
Full textKlang, Mathias. "Spyware ? the ethics of covert software." Ethics and Information Technology 6, no. 3 (2004): 193–202. http://dx.doi.org/10.1007/s10676-004-3392-3.
Full textKucera, Kyle, Michel Plaisent, Prosper Bernard, and Lassana Maguiraga. "An empirical investigation of the prevalence of spyware in internet shareware and freeware distributions." Journal of Enterprise Information Management 18, no. 6 (December 1, 2005): 697–708. http://dx.doi.org/10.1108/17410390510628391.
Full textKlang, Mathias. "Spyware: paying for software with our privacy." International Review of Law, Computers & Technology 17, no. 3 (November 2003): 313–22. http://dx.doi.org/10.1080/1360086032000174405.
Full textDamanik, Annisa Rizky, Henki Bayu Seta, and Theresiawati Theresiawati. "ANALISIS TROJAN DAN SPYWARE MENGGUNAKAN METODE HYBRID ANALYSIS." Jurnal Ilmiah Matrik 25, no. 1 (May 23, 2023): 89–97. http://dx.doi.org/10.33557/jurnalmatrik.v25i1.2327.
Full textAmes, W. "Understanding spyware: risk and response." IT Professional 6, no. 5 (September 2004): 25–29. http://dx.doi.org/10.1109/mitp.2004.71.
Full textGoud, Ediga Komal, and Gadekari Rohith Reddy. "Keylogger Surveillance Software." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 1406–9. http://dx.doi.org/10.22214/ijraset.2023.49683.
Full textAbdul Wahed, Ali Abdul Hussien. "Local and Public Traffic Concrete Barrier (TCB)." Journal of Kufa for Mathematics and Computer 1, no. 2 (October 30, 2010): 1–11. http://dx.doi.org/10.31642/jokmc/2018/010201.
Full textLuo, Xin. "A Holistic Approach for Managing Spyware." EDPACS 33, no. 11 (May 2006): 1–9. http://dx.doi.org/10.1201/1079.07366981/45977.33.11.20060501/93007.1.
Full textGordon, Sarah. "Fighting Spyware and Adware in the Enterprise." EDPACS 32, no. 12 (June 2005): 14–18. http://dx.doi.org/10.1201/1079/45242.32.12.20050601/88294.2.
Full textRossetto, Anubis Graciela de Moraes, Darlan Noetzold, Luis Augusto Silva, and Valderi Reis Quietinho Leithardt. "Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models." Sensors 24, no. 13 (June 28, 2024): 4212. http://dx.doi.org/10.3390/s24134212.
Full textReddy, Reddyvari Venkateswara, Gattu Laxmi Priya, K. Varshini, and Mahankali Varun. "Spyware Surveillance on Keyboard Through Electronic Messaging Protocol." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 609–15. http://dx.doi.org/10.22214/ijraset.2024.59835.
Full textFakiha, Bandr. "The Role of Raspberry Pi in Forensic Computer Crimes." Journal of Internet Services and Information Security 13, no. 4 (December 2, 2023): 76–87. http://dx.doi.org/10.58346/jisis.2023.i4.005.
Full textKikelomo, Akinwole Agnes, Yekini Nureni Asafe, and Ogundele Israel Oludayo. "Malware Detection System Using Mathematics of Random Forest Classifier." International Journal of Advances in Scientific Research and Engineering 09, no. 03 (2023): 45–53. http://dx.doi.org/10.31695/ijasre.2023.9.3.6.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textLavesson, Niklas, Martin Boldt, Paul Davidsson, and Andreas Jacobsson. "Learning to detect spyware using end user license agreements." Knowledge and Information Systems 26, no. 2 (January 16, 2010): 285–307. http://dx.doi.org/10.1007/s10115-009-0278-z.
Full textEnglish, Ed. "Why You Should Not Play the Numbers Game with Anti-Spyware Vendors." EDPACS 33, no. 8 (February 2006): 20–24. http://dx.doi.org/10.1201/1079.07366981/45802.33.8.20060201/91958.3.
Full textLabinsky, Alexander. "THE MONITORING OF OPERATING SYSTEM AS THE MEANS OF THE INFORMATION PROTECTION." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 1 (April 17, 2024): 16–23. http://dx.doi.org/10.61260/2307-7476-2024-1-16-23.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textKamarudin, Nur Khairani, Nur Nazifa Md Hasani, Rafiza Ruslan, Rashidah Ramle, Nurul Hidayah Ahmad Zukri, and Iman Hazwam Abd Halim. "Performance Analysis of Malware Attack." Journal of Computing Research and Innovation 3, no. 4 (November 18, 2018): 19–24. http://dx.doi.org/10.24191/jcrinn.v3i4.72.
Full textK, Valarmathi, Hemalatha S, Perumal P, Puthilibai D, and Abirami M. "Shoulder Surfing Attack Trusted Verification – A Survey." ECS Transactions 107, no. 1 (April 24, 2022): 16041–47. http://dx.doi.org/10.1149/10701.16041ecst.
Full textFaisal, Mohammad, and Sa’ed Abed. "Cluster-Based Antiphishing (CAP) Model for Smart Phones." Scientific Programming 2021 (July 7, 2021): 1–9. http://dx.doi.org/10.1155/2021/9957323.
Full textKauser.Sk, Heena, and Maria Anu.V. "A Hybrid Model for Android Malware Detection using Decision Tree and KNN." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 15, 2022): 321–28. http://dx.doi.org/10.17762/ijritcc.v10i1s.5899.
Full textBauri, Mr Chandra Kant, Mr Chetan Indulkar, Mr Shantanu Jadhav,, and Prof Anjali S. Khandagale. "Windows Post Exploitation [MSF] Keylogger for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1329–33. http://dx.doi.org/10.22214/ijraset.2022.41509.
Full textAbbas, Umar Farouk, and Abdulrahman Abdulkarim. "PERFORMANCE ANALYSIS OF CAPTCHA BASED BLOCKING AND RESPONSE OF AN INTRUSION DETECTION MODEL USING SIGNATURE." FUDMA JOURNAL OF SCIENCES 6, no. 3 (July 6, 2022): 248–53. http://dx.doi.org/10.33003/fjs-2022-0603-998.
Full textBauri, Chandra Kant, Chetan Indulkar, Shantanu Jadhav, and Prof Anjali S. Khandagale. "A Survey on Windows Post Exploitation [MSF] Keylogger for Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 721–26. http://dx.doi.org/10.22214/ijraset.2022.40684.
Full textLima Carvajal, Roberth Gabriel, and Marco Inlago. "Spyware." INNOVATION & DEVELOPMENT IN ENGINEERING AND APPLIED SCIENCES 3, no. 2 (February 3, 2022). http://dx.doi.org/10.53358/ideas.v3i2.630.
Full text"Put spyware on the security." ITNOW 47, no. 1 (December 16, 2004): 18–19. http://dx.doi.org/10.1093/combul/bwi006.
Full text"Prevention of Cyber Crime in Bangladesh." International Journal for Empirical Education and Research, April 30, 2019, 33–47. http://dx.doi.org/10.35935/edr/34.4733.
Full textNaser, Muawya, Hussein Albazar, and Hussein Abdel-Jaber. "Mobile Spyware Identification and Categorization: A Systematic Review." Informatica 47, no. 8 (September 28, 2023). http://dx.doi.org/10.31449/inf.v47i8.4881.
Full textR., Manasa, and A. Jayanthila Devi. "Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors." International Journal of Case Studies in Business, IT, and Education, April 12, 2023, 90–105. http://dx.doi.org/10.47992/ijcsbe.2581.6942.0261.
Full textWaliulu, Raditya Faisal. "Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 1 (September 26, 2018). http://dx.doi.org/10.20895/inista.v1i1.10.
Full textAsir, D. "Enhancing Malware Detection through Machine Learning: A Comparative Analysis of Random Forest and Naive Bayes Classification Systems." International Journal of Advanced Research in Science and Technology, 2024, 1288–92. http://dx.doi.org/10.62226/ijarst20241332.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV." KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) 2, no. 1 (October 5, 2018). http://dx.doi.org/10.30865/komik.v2i1.902.
Full textDowns, Daniel M., Ilir Ademaj, and Amie M. Schuck. "Internet security: Who is leaving the ‘virtual door’ open and why?" First Monday, December 26, 2008. http://dx.doi.org/10.5210/fm.v14i1.2251.
Full text"Spyware Infiltration Rises in Corporate Networks, But Webroot Survey Finds Companies Still Neglect Threat." EDPACS 32, no. 7 (January 2005): 24. http://dx.doi.org/10.1201/1079/44911.32.7.20050101/85732.3.
Full text"Detection of Malicious Uniform Resource Locator." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 41–47. http://dx.doi.org/10.35940/ijrte.a1265.078219.
Full textXiao, Peng. "Network Malware Detection Using Deep Learning Network Analysis." Journal of Cyber Security and Mobility, December 11, 2023. http://dx.doi.org/10.13052/jcsm2245-1439.1312.
Full textAlmoqbil, Abdullah Hamad N. "Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard." International Journal of Information Security, April 13, 2024. http://dx.doi.org/10.1007/s10207-024-00841-z.
Full textHossain, Md Alamgir, and Md Saiful Islam. "Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity." Cybersecurity 7, no. 1 (January 25, 2024). http://dx.doi.org/10.1186/s42400-024-00205-z.
Full textBaloi, Aurel, Bogdan Belean, Flaviu Turcu, and Daniel Peptenatu. "GPU-based similarity metrics computation and machine learning approaches for string similarity evaluation in large datasets." Soft Computing, June 14, 2023. http://dx.doi.org/10.1007/s00500-023-08687-8.
Full text"Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 2028–33. http://dx.doi.org/10.35940/ijitee.c8817.019320.
Full textHimanshu, Sachin Kaushik, Pankaj Kumar, and Vimmi Malhotra. "Keystroke Logging for Activity-Monitoring using Python." International Journal of Advanced Research in Science, Communication and Technology, April 26, 2024, 684–90. http://dx.doi.org/10.48175/ijarsct-17695.
Full text