[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Spyware be gone!

Published: 01 March 2005 Publication History

Abstract

The times they are a-changing: White is the new black. Thirty is the new 20. And spyware is the new spam---with a dash of virus mixed in for good measure. (Of course, we still have plenty of original-flavor spam and viruses hanging around, too). What the old-school intruders have going for them is that they are relatively straightforward to define. Spyware, in its broadest sense, is harder to pin down. Yet many feel, as the late Supreme Court Justice Potter Stewart once said, "I know it when I see it."

Cited By

View all
  • (2018)Learning to detect spyware using end user license agreementsKnowledge and Information Systems10.5555/3225634.322577226:2(285-307)Online publication date: 29-Dec-2018
  • (2018)Multi-device application middlewareThe Journal of Supercomputing10.1007/s11227-013-0901-366:1(4-20)Online publication date: 31-Dec-2018
  • (2011)Building an E-contract management system using Google Docs2011 IEEE 12th International Symposium on Computational Intelligence and Informatics (CINTI)10.1109/CINTI.2011.6108503(225-230)Online publication date: Nov-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image netWorker
netWorker  Volume 9, Issue 1
Agents of destruction: fending off spyware
March 2005
35 pages
ISSN:1091-3556
EISSN:1558-3473
DOI:10.1145/1050831
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2005
Published in NETWORKER Volume 9, Issue 1

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Learning to detect spyware using end user license agreementsKnowledge and Information Systems10.5555/3225634.322577226:2(285-307)Online publication date: 29-Dec-2018
  • (2018)Multi-device application middlewareThe Journal of Supercomputing10.1007/s11227-013-0901-366:1(4-20)Online publication date: 31-Dec-2018
  • (2011)Building an E-contract management system using Google Docs2011 IEEE 12th International Symposium on Computational Intelligence and Informatics (CINTI)10.1109/CINTI.2011.6108503(225-230)Online publication date: Nov-2011
  • (2010)Interação em nuvensProceedings of the IX Symposium on Human Factors in Computing Systems10.5555/1999593.1999620(209-212)Online publication date: 5-Oct-2010
  • (2008)A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client ComputersProceedings of the Fifth International Conference on Information Technology: New Generations10.1109/ITNG.2008.233(628-632)Online publication date: 7-Apr-2008
  • (2007)Self-Healing Spyware: Detection, and RemediationIEEE Transactions on Reliability10.1109/TR.2007.90975556:4(588-596)Online publication date: Dec-2007
  • (2007)A Robust Technique of Anti Key-Logging using Key-Logging Mechanism2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference10.1109/DEST.2007.371990(314-318)Online publication date: Feb-2007
  • (2006)A Stateful Approach to Spyware Detection and RemovalProceedings of the 12th Pacific Rim International Symposium on Dependable Computing10.1109/PRDC.2006.15(173-182)Online publication date: 18-Dec-2006

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media