Works matching DE "SPYWARE (Computer software)"
Results: 79
Malicious Firmware Attack Detection in ICT tools Connected on Cloud Services using Deep Random Forest (MAC-DRF).
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2022, v. 8, n. 1, p. 557
- By:
- Publication type:
- Article
Branching Out: Factors Motivating Nondemocratic Use of Commodity Spyware.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2024, v. 37, n. 1, p. 286, doi. 10.1080/08850607.2023.2202345
- By:
- Publication type:
- Article
Comparing the effectiveness of antispyware removal tools.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 2, p. 15
- By:
- Publication type:
- Article
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 3, doi. 10.1007/s10796-007-9035-6
- By:
- Publication type:
- Article
WHAT NOT TO "WARE": AS CONGRESS STRUGGLES AGAINST SPYWARE, THE FBI DEVELOPS ITS OWN.
- Published in:
- Rutgers Computer & Technology Law Journal, 2008, v. 35, n. 1, p. 77
- By:
- Publication type:
- Article
Rogues and Spyware: Pegasus Strikes Again.
- Published in:
- CounterPunch, 2022, p. 1
- By:
- Publication type:
- Article
Blacklisting the Merchants of Spyware.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus and the Threat of Cyberweapons in the Age of Smartphones.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus and the Global Surveillance Business.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus Rides Again: the NSO Group, Spyware and Human Rights.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Cyberthreats Facing the Banking Industry.
- Published in:
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 26
- By:
- Publication type:
- Article
Assessing Offensive Cyber Capabilities: Exploring the Talent Behind Cybersecurity.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2023, v. 22, n. 3, p. 5, doi. 10.32565/aarms.2023.3.1
- By:
- Publication type:
- Article
PROTECTING INDIVIDUAL SECURITY ONLINE AND IN THE REAL WORLD.
- Published in:
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Publication type:
- Article
Marketing and Internet Professionals' Fiduciary Responsibility: A Perspective on Spyware.
- Published in:
- Journal of Internet Commerce, 2006, v. 5, n. 3, p. 109, doi. 10.1300/J179v05n03_05
- By:
- Publication type:
- Article
Hacking: A Threat to Industrial Work Forces.
- Published in:
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- By:
- Publication type:
- Article
Neoliberalism's conditioning effects on the university and the example of proctoring during COVID-19 and since.
- Published in:
- Journal of Critical Realism, 2022, v. 21, n. 5, p. 502, doi. 10.1080/14767430.2022.2100612
- By:
- Publication type:
- Article
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
- Published in:
- Social Science Computer Review, 2007, v. 25, n. 1, p. 78, doi. 10.1177/0894439306292346
- By:
- Publication type:
- Article
Spyware and Adware: How Do Internet Users Defend Themselves?
- Published in:
- American Journal of Business (American Journal of Business), 2009, v. 24, n. 2, p. 41, doi. 10.1108/19355181200900010
- By:
- Publication type:
- Article
Lost in Translation: New Media Ι Old School Lesson.
- Published in:
- American Journal of Business (American Journal of Business), 2009, v. 24, n. 2, p. 3
- By:
- Publication type:
- Article
McAfee: filtering out cybernasties.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 83
- By:
- Publication type:
- Article
Spyware up 10% in first quarter.
- Published in:
- ComputerWorld Hong Kong, 2009, v. 26, n. 4, p. 30
- By:
- Publication type:
- Article
WHO CAN FIX THE SPYWARE PROBLEM?
- Published in:
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 555
- By:
- Publication type:
- Article
FIRST DO NO HARM: THE PROBLEM OF SPYWARE.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1433
- By:
- Publication type:
- Article
REGULATING "SPYWARE": THE LIMITATIONS OF STATE "LABORATORIES" AND THE CASE FOR FEDERAL PREEMPTION OF STATE UNFAIR COMPETITION LAWS.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1363
- By:
- Publication type:
- Article
CONTRACTING SPYWARE BY CONTRACT.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1345
- By:
- Publication type:
- Article
SPYWARE AND THE LIMITS OF SURVEILLANCE LAW.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1283
- By:
- Publication type:
- Article
PRIVACY INALIENABILITY AND THE REGULATION OF SPYWARE.
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1269
- By:
- Publication type:
- Article
UTAH SPYWARE LEGISLATION Spyware Control Act, Utah Code Ann. f 1340-101 to -401 (2004) WHENU.COM INC. V, UTAH No. 040907578 (D. Utah June 22, 2004).
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 340
- Publication type:
- Article
Examining the Affects of Student Multitasking With Laptops During the Lecture.
- Published in:
- Journal of Information Systems Education, 2010, v. 21, n. 2, p. 241
- By:
- Publication type:
- Article
MARKETING, CONSUMERS AND TECHNOLOGY: PERSPECTIVES FOR ENHANCING ETHICAL TRANSACTIONS.
- Published in:
- Business Ethics Quarterly, 2006, v. 16, n. 3, p. 313, doi. 10.5840/beq200616330
- By:
- Publication type:
- Article
Spyware Identification for Android Systems Using Fine Trees.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 2, p. 102, doi. 10.3390/info14020102
- By:
- Publication type:
- Article
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
- Published in:
- Journal of Global Information Management, 2008, v. 16, n. 2, p. 91, doi. 10.4018/jgim.2008040106
- By:
- Publication type:
- Article
Risky business.
- Published in:
- Public Relations Tactics, 2012, v. 19, n. 9, p. 7
- By:
- Publication type:
- Article
IMAGES.
- Published in:
- Diacritics, 2014, v. 42, n. 1, p. 110
- By:
- Publication type:
- Article
Similarity assessment for removal of noisy end user license agreements.
- Published in:
- Knowledge & Information Systems, 2012, v. 32, n. 1, p. 167, doi. 10.1007/s10115-011-0438-9
- By:
- Publication type:
- Article
Learning to detect spyware using end user license agreements.
- Published in:
- Knowledge & Information Systems, 2011, v. 26, n. 2, p. 285, doi. 10.1007/s10115-009-0278-z
- By:
- Publication type:
- Article
La utilización de software como herramienta de interceptación de comunicaciones.
- Published in:
- Cuadernos de Derecho Penal, 2021, n. 26, p. 93
- By:
- Publication type:
- Article
Evaluating Grayware Characteristics and Risks.
- Published in:
- Journal of Computer Networks & Communications, 2011, p. 1, doi. 10.1155/2011/569829
- By:
- Publication type:
- Article
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 2377, doi. 10.1007/s10207-024-00841-z
- By:
- Publication type:
- Article
Education Roundup.
- Published in:
- Our Schools / Our Selves, 2011, v. 20, n. 2, p. 9
- By:
- Publication type:
- Article
Account Information Requests From E-mail.
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 3, p. 6
- By:
- Publication type:
- Article
Security.
- Published in:
- IEEE Internet Computing, 2005, v. 9, n. 6, p. 12
- By:
- Publication type:
- Article
Security.
- Published in:
- IEEE Internet Computing, 2005, v. 9, n. 5, p. 12
- By:
- Publication type:
- Article
CASUS YAZILIMLAR: BULAŞMA YÖNTEMLERİ VE ÖNLEMLER.
- Published in:
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2008, v. 23, n. 1, p. 165
- By:
- Publication type:
- Article
KÖTÜCÜL VE CASUS YAZILIMLAR: KAPSAMLI BİR ARAŞTIRMA.
- Published in:
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2007, v. 22, n. 1, p. 121
- By:
- Publication type:
- Article
CURATING DATASETS TO ENHANCE SPYWARE CLASSIFICATION.
- Published in:
- Jordanian Journal of Computers & Information Technology, 2025, v. 11, n. 1, p. 1
- By:
- Publication type:
- Article
Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.
- Published in:
- Afyon Kocatepe University Journal of Science & Engineering / Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 2024, v. 24, n. 5, p. 1189, doi. 10.35414/akufemubid.1451007
- By:
- Publication type:
- Article
Unmasking the Term 'Dual Use' in EU Spyware Export Control.
- Published in:
- European Journal of International Law, 2023, v. 34, n. 3, p. 697, doi. 10.1093/ejil/chad039
- By:
- Publication type:
- Article
Privatized espionage: NSO Group Technologies and its Pegasus spyware.
- Published in:
- Thunderbird International Business Review, 2023, v. 65, n. 3, p. 355, doi. 10.1002/tie.22321
- By:
- Publication type:
- Article
Parsing Pegasus: An Infrastructural Approach to the Relationship between Technology and Swiss Security Politics.
- Published in:
- Swiss Political Science Review, 2021, v. 27, n. 1, p. 205, doi. 10.1111/spsr.12441
- By:
- Publication type:
- Article