메뉴 건너뛰기




Volumn , Issue , 2007, Pages 275-281

Examining web-based spyware invasion with Stateful behavior monitoring

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET;

EID: 50049111622     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2007.33     Document Type: Conference Paper
Times cited : (1)

References (13)
  • 2
    • 23344441723 scopus 로고    scopus 로고
    • Spyware: A Little Knowledge is a Wonderful Thing
    • New York, Aug
    • M. B. Schmidt, and K. P. Arnett, "Spyware: A Little Knowledge is a Wonderful Thing," Communications of the ACM, New York, Vol. 48, Iss. 8, p. 67-70, Aug., 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.ISS. 8 , pp. 67-70
    • Schmidt, M.B.1    Arnett, K.P.2
  • 5
    • 33845399252 scopus 로고    scopus 로고
    • Spyware be Gone
    • New York, March
    • W. Aaron, "Spyware be Gone," NetWorker, New York, Vol.9, Iss. 1,p. 18, March 2005.
    • (2005) NetWorker , vol.9 , Issue.ISS. 1 , pp. 18
    • Aaron, W.1
  • 8
    • 23344444212 scopus 로고    scopus 로고
    • Is Spyware an Internet Nuisance or Public Menace
    • New York, Aug
    • Q. Hu, and T. Dinev, "Is Spyware an Internet Nuisance or Public Menace," Communications of the ACM, New York, Vol. 48, Iss. 8, p. 61-66, Aug., 2005
    • (2005) Communications of the ACM , vol.48 , Issue.ISS. 8 , pp. 61-66
    • Hu, Q.1    Dinev, T.2
  • 9
    • 9144256106 scopus 로고    scopus 로고
    • Understanding spyware: Risk and response
    • Sep.-Oct
    • W. Ames, "Understanding spyware: risk and response," IEEE IT Professional, Vol. 6, Iss. 5, p. 25-29, Sep.-Oct., 2004.
    • (2004) IEEE IT Professional , vol.6 , Issue.ISS. 5 , pp. 25-29
    • Ames, W.1
  • 13
    • 0027699087 scopus 로고
    • Lattice-Based Access Control Models
    • R. S. Sandhu, "Lattice-Based Access Control Models," IEEE Computer, 26(11), p. 9-19, 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.