-
3
-
-
84858547747
-
-
Apple
-
Apple, QuickTime Broadcaster http://apple.com/quicktime/broadcaster
-
QuickTime Broadcaster
-
-
-
9
-
-
23344439017
-
Spyware was inevitable
-
S. Gibson Spyware was inevitable Communications of the ACM 48 8 2005 37 39
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 37-39
-
-
Gibson, S.1
-
17
-
-
67149105907
-
Privacy concealments: Detective strategies unveiling cyberstalking on internet
-
IEEE Computer Society Washington, DC, USA, doi:10.1109/APSCC.2008.106
-
D.-Y. Kao, S.-J. Wang, K. Mathur, S. Jain, and F.F.-Y. Huang Privacy concealments: detective strategies unveiling cyberstalking on internet APSCC '08: proceedings of the 2008 IEEE Asia-Pacific services computing conference 2008 IEEE Computer Society Washington, DC, USA 1364 1368 http://dx.doi.org/ doi:10.1109/APSCC.2008.106
-
(2008)
APSCC '08: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
, pp. 1364-1368
-
-
Kao, D.-Y.1
Wang, S.-J.2
Mathur, K.3
Jain, S.4
Huang, F.F.-Y.5
-
18
-
-
77955716478
-
Botnets: Overview and case study
-
Mercy College
-
Kiran-Kola M. Botnets: overview and case study. Tech. rep., Mercy College; 2008.
-
(2008)
Tech. Rep.
-
-
Kiran-Kola, M.1
-
19
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
101109/M2005134
-
N. Leavitt Mobile phones: the next frontier for hackers? IEEE Computer 38 4 2005 20 23 10.1109/MC.2005.134
-
(2005)
IEEE Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
20
-
-
84906038213
-
FBI taps cell phone mic as eavesdropping tool
-
D. McCullagh FBI taps cell phone mic as eavesdropping tool ZDNet News Dec. 2006
-
(2006)
ZDNet News
-
-
McCullagh, D.1
-
21
-
-
77950813354
-
The snooping dragon: Social-malware surveillance of the tibetan movement
-
Computer Laboratory; March
-
Nagaraja S, Anderson R. The snooping dragon: social-malware surveillance of the tibetan movement. Tech. Rep. UCAM-CL-TR-746: University of Cambridge, Computer Laboratory; March 2009.
-
(2009)
Tech. Rep. UCAM-CL-TR-746: University of Cambridge
-
-
Nagaraja, S.1
Anderson, R.2
-
22
-
-
77955717999
-
-
Apr.
-
Poulsen K. Documents: FBI spyware has been snaring extortionists, hackers for years, Wired: Threat level, Privacy, Crime, and Security Online; Apr. 2009.
-
(2009)
Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years, Wired: Threat Level, Privacy, Crime, and Security Online
-
-
Poulsen, K.1
-
26
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Saponas S.T, Lester J, Hartung C, Agarwal S, Kohno T. Devices that tell on you: privacy trends in consumer ubiquitous computing. In: Proceedings of the 16th USENIX security symposium; 2007. pp. 55-70.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 55-70
-
-
Saponas, S.T.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
27
-
-
77955711653
-
Comparison of voice over IP with circuit switching techniques
-
Department of Electronics and Computer Science; Jan
-
Sinden R. Comparison of voice over IP with circuit switching techniques. Tech. rep.: Southampton University, Department of Electronics and Computer Science; Jan. 2002.
-
(2002)
Tech. Rep.: Southampton University
-
-
Sinden, R.1
-
32
-
-
85029716586
-
Editorial: People watching people
-
D. Wood Editorial: people watching people Surveillance and Society 2 4 2005 474 478
-
(2005)
Surveillance and Society
, vol.2
, Issue.4
, pp. 474-478
-
-
Wood, D.1
|