메뉴 건너뛰기




Volumn 15, Issue 2, 2006, Pages 42-48

A holistic approach for managing spyware

Author keywords

[No Author keywords available]

Indexed keywords


EID: 70349152526     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1201/1086.1065898X/46051.15.2.20060501/93407.6     Document Type: Article
Times cited : (5)

References (10)
  • 4
    • 23344436074 scopus 로고    scopus 로고
    • Spyware: Menace, nuisance, or both?
    • G. Goth, “Spyware: Menace, Nuisance, or Both?” IEEE Security & Privacy, vol. 1, pp. 10-11, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 10-11
    • Goth, G.1
  • 6
    • 9544258256 scopus 로고    scopus 로고
    • A generic antispyware solution by access control list at kernel level
    • S. S. M. Chow, L. C. K. Hui, S. M. Yiu, K. P. Chow, and R. W. C. Lu, “A Generic Antispyware Solution By Access Control List at Kernel Level,” Journal of Systems and Software, vol. 75, pp. 227-234, 2005.
    • (2005) Journal of Systems and Software , vol.75 , pp. 227-234
    • Chow, S.1    Hui, L.2    Yiu, S.M.3    Chow, K.P.4    Lu, R.W.5
  • 7
    • 9144256106 scopus 로고    scopus 로고
    • Understanding spyware: Risk and response
    • W. Ames, “Understanding Spyware: Risk and Response,” IEEE Computer Society: IT Pro, vol. 6, pp. 25-29, 2004.
    • (2004) IEEE Computer Society: IT Pro , vol.6 , pp. 25-29
    • Ames, W.1
  • 8
    • 23344432178 scopus 로고    scopus 로고
    • Spyware: Technologies, issues, and policy proposals
    • P. J. Bruening and M. Steffen, “Spyware: Technologies, Issues, and Policy Proposals,” Journal of Internet Law, vol. 7, pp. 3-8, 2004.
    • (2004) Journal of Internet Law , vol.7 , pp. 3-8
    • Bruening, P.J.1    Steffen, M.2
  • 9
    • 0036645515 scopus 로고    scopus 로고
    • Invasive software: Whos inside your computer,”
    • G. Lawton, “Invasive Software: Who’s Inside Your Computer,” IEEE Computer, vol. 35, pp. 15-18, 2002.
    • (2002) IEEE Computer , vol.35 , pp. 15-18
    • Lawton, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.