메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A Crawler-based Study of Spyware on the Web

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER VIRUSES; NETWORK SECURITY;

EID: 85077681170     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (133)

References (29)
  • 1
    • 85180627766 scopus 로고    scopus 로고
    • Ad-Aware. http://www.lavasoftusa.com/software/adaware/.
    • Ad-Aware
  • 2
    • 19944402322 scopus 로고    scopus 로고
    • October
    • America Online and the National Cyber Security Alliance. AOL/NCSA online safety study. www.staysafeonline.info/news/safety_study_v04.pdf, October 2004.
    • (2004) AOL/NCSA online safety study
  • 4
    • 23344443023 scopus 로고    scopus 로고
    • The deceptive behaviors that offend us most about spyware
    • Neveen Farag Awad and Kristina Fitzgerald. The deceptive behaviors that offend us most about spyware. Communications of the ACM, 48(8):55–60, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 55-60
    • Awad, Neveen Farag1    Fitzgerald, Kristina2
  • 7
    • 23344439017 scopus 로고    scopus 로고
    • Spyware was inevitable
    • Steve Gibson. Spyware was inevitable. Communications of the ACM, 48(8):37–39, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 37-39
    • Gibson, Steve1
  • 8
    • 23344444212 scopus 로고    scopus 로고
    • Is spyware an internet nuisance or public menace?
    • Qing Hu and Tamara Dinev. Is spyware an internet nuisance or public menace? Communications of the ACM, 48(8):61–66, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 61-66
    • Hu, Qing1    Dinev, Tamara2
  • 10
    • 85180628141 scopus 로고    scopus 로고
    • Kazaa. http://www.kazaa.com.
    • Kazaa
  • 12
    • 23344453209 scopus 로고    scopus 로고
    • Investigating factors affecting the adoption of anti-spyware systems
    • Younghwa Lee and Kenneth A. Kozar. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM, 48(8):72–77, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 72-77
    • Lee, Younghwa1    Kozar, Kenneth A.2
  • 17
    • 23344441723 scopus 로고    scopus 로고
    • Spyware: a little knowledge is a wonderful thing
    • Mark B. Schmidt and Kirk P. Arnett. Spyware: a little knowledge is a wonderful thing. Communications of the ACM, 48(8):67–70, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 67-70
    • Schmidt, Mark B.1    Arnett, Kirk P.2
  • 19
    • 0013135152 scopus 로고    scopus 로고
    • Analysis and detection of computer viruses and worms: An annotated bibliography
    • February
    • Prabhat K. Singh and Arun Lakhotia. Analysis and detection of computer viruses and worms: An annotated bibliography. ACM SIGPLAN Notices, 37(2):29–35, February 2002.
    • (2002) ACM SIGPLAN Notices , vol.37 , Issue.2 , pp. 29-35
    • Singh, Prabhat K.1    Lakhotia, Arun2
  • 20
    • 23344454260 scopus 로고    scopus 로고
    • Introduction to the special issue on spyware
    • Thomas F. Stafford. Introduction to the special issue on spyware. Communications of the ACM, 48(8):34–36, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 34-36
    • Stafford, Thomas F.1
  • 22
  • 23
    • 23344447680 scopus 로고    scopus 로고
    • Why spyware poses multiple threats to security
    • Roger Thompson. Why spyware poses multiple threats to security. Communications of the ACM, 48(8):41–43, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 41-43
    • Thompson, Roger1
  • 24
    • 33750356750 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Technical Report MSR-TR-2005-72, Microsoft Research, August
    • Yi-Min Wang, Doug Beck, Xuxian Jiang, and Roussi Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. Technical Report MSR-TR-2005-72, Microsoft Research, August 2005.
    • (2005)
    • Wang, Yi-Min1    Beck, Doug2    Jiang, Xuxian3    Roussev, Roussi4
  • 28
    • 63149143627 scopus 로고    scopus 로고
    • Webroot Software, Inc. Described at
    • Webroot Software, Inc. Automated threat research. Described at http://research.spysweeper.com/automated_research.html.
    • Automated threat research
  • 29
    • 23344449408 scopus 로고    scopus 로고
    • What do consumers really know about spyware?
    • Xiaoni Zhang. What do consumers really know about spyware? Communications of the ACM, 48(8):44–48, 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 44-48
    • Zhang, Xiaoni1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.