Spyware and Adware
暂无分享,去创建一个
[1] A. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[2] Jon Erickson,et al. Hacking: The Art of Exploitation , 2008 .
[3] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[4] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[6] James A. Haskett,et al. Pass-algorithms: a user validation scheme based on knowledge of secret algorithms , 1984, CACM.
[7] Mark P. Zanna,et al. Subliminal priming and persuasion: Striking while the iron is hot , 2002 .
[8] Mark Stamp,et al. Information security - principles and practice , 2005 .
[9] R. Power. CSI/FBI computer crime and security survey , 2001 .
[10] Jan Panero Benway,et al. Banner Blindness: The Irony of Attention Grabbing on the World Wide Web , 1998 .
[11] C. Yoo,et al. Processing of animation in online banner advertising: The roles of cognitive and emotional responses , 2005 .
[12] Moti Yung,et al. Fourth-factor authentication: somebody you know , 2006, CCS '06.
[13] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .
[14] Marie-Francine Moens,et al. Automatic Indexing and Abstracting of Document Texts , 2000, Computational Linguistics.
[15] Ankit Fadia. Network Security , 2002 .
[16] Niels Provos,et al. All Your iFRAMEs Point to Us , 2008, USENIX Security Symposium.
[17] Umesh Shankar,et al. Doppelganger: Better browser privacy without the bother , 2006, CCS '06.
[18] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[19] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[20] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[21] Joshua Goodman,et al. Finding advertising keywords on web pages , 2006, WWW '06.
[22] Kimball P. Marshall,et al. Marketing and Internet Professionals' Fiduciary Responsibility: A Perspective on Spyware , 2006 .
[23] James P. Davis. Spyware Protection: Seek and Destroy Embedded Bugs , 2007 .
[24] M. Hupfer,et al. Getting Something for Nothing , 2005 .
[25] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[26] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[27] James C. Anderson,et al. STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .
[28] Balachander Krishnamurthy,et al. Generating a privacy footprint on the internet , 2006, IMC '06.
[29] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[30] Drew Hintz,et al. Covert Channels in TCP and IP headers , 2009 .
[31] J. Abbate,et al. Inventing the Internet , 1999 .
[32] Charles P. Pfleeger,et al. Security in computing , 1988 .
[33] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2009 .
[34] Janice C. Sipior,et al. The Ethical and Legal Concerns of Spyware , 2005, Inf. Syst. Manag..
[35] Naveen Donthu,et al. Emotional Appeal and Incentive Offering in Banner Advertisements , 2004 .
[36] Johnny Lim. Defeat spyware with anti-screen capture technology using visual persistence , 2007, SOUPS '07.
[37] A. Lenhart,et al. Music Downloading and Listening: Findings from the Pew Internet and American Life Project , 2004 .
[38] Qing Hu,et al. The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..
[39] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[40] Steve Gibson,et al. Spyware was inevitable , 2005, CACM.
[41] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[42] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[43] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[44] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[45] Daniel B. Garrie,et al. Parasiteware: Unlocking Personal Privacy , 2006 .
[46] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[47] Sarah Granger,et al. Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .
[48] Sejung Marina Choi,et al. Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures , 2005 .
[49] Charles F. Hofacker,et al. Clickable World Wide Web banner ads and content sites , 2000 .
[50] Markus Jakobsson,et al. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft , 2006 .
[51] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[52] John Aycock,et al. Viruses 101 , 2005 .
[53] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[54] Mirina Grosz,et al. World Wide Web Consortium , 2010 .
[55] Wei-Ming Hu,et al. Reducing timing channels with fuzzy time , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[56] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[57] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[58] John Maxtone-Graham,et al. The Only Way to Cross , 1972 .
[59] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[60] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[61] Barbara M. Byrne,et al. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[62] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[63] Balachander Krishnamurthy,et al. Measuring privacy loss and the impact of privacy protection in web browsing , 2007, SOUPS '07.
[64] P. Sleight. Targeting customers : how to use geodemographic and lifestyle data in your business , 2004 .
[65] Sung-Joon Yoon. An experimental approach to understanding banner adverts' effectiveness , 2003 .
[66] M. Browne,et al. Alternative Ways of Assessing Model Fit , 1992 .
[67] Claire Allison Stammerjohan,et al. BANNER ADVERTISER-WEB SITE CONTEXT CONGRUITY AND COLOR EFFECTS ON ATTENTION AND ATTITUDES , 2005 .
[68] Andrea Everard,et al. The effects of online advertising , 2007, Commun. ACM.
[69] John Aycock. Teaching Spam and Spyware at the University of C@1g4ry , 2006, CEAS.
[70] Viktor Krammer,et al. An Effective Defense against Intrusive Web Advertising , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[71] C. Yoo,et al. Assessing the Effects of Animation in Online Banner Advertising , 2004 .
[72] David Salomon,et al. Coding for Data and Computer Communications , 2005 .
[73] John Aycock,et al. Computer Viruses and Malware , 2006, Advances in Information Security.
[74] Shelly Rodgers,et al. The Interactive Advertising Model , 2000 .
[75] Wendy W. Moe,et al. The Influence of Goal‐Directed and Experiential Activities on Online Flow Experiences , 2003 .
[76] Clinton G. Carr,et al. Reverse Geographic Location of a Computer Node , 2012 .
[77] Lance J. Hoffman,et al. Computers and Privacy: A Survey , 1969, CSUR.
[78] Bill Cheswick. Johnny Can Obfuscate: Beyond Mother's Maiden Name , 2006, HotSec.
[79] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[80] R. Burchfield. Oxford English dictionary , 1982 .
[81] Anthony P. Badali,et al. Intelligent ad resizing , 2010, WWW '10.
[82] Xiaoni Zhang,et al. What do consumers really know about spyware? , 2005, CACM.
[83] John Aycock,et al. Black Market Botnets , 2007 .
[84] David Elliott Bell,et al. Looking back at the Bell-La Padula model , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[85] Tom Stafford,et al. Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..
[86] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[87] Barry G. Evans,et al. Systems and Services , 2007 .
[88] Markus Jakobsson,et al. Distributed Phishing Attacks , 2005, IACR Cryptol. ePrint Arch..
[89] R. MacCallum,et al. Power analysis and determination of sample size for covariance structure modeling. , 1996 .
[90] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[91] Carla E. Brodley,et al. IP Covert Channel Detection , 2009, TSEC.
[92] Nicholas Kushmerick,et al. Learning to remove Internet advertisements , 1999, AGENTS '99.
[93] Helen J. Wang,et al. SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[94] Felix C. Freiling,et al. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones , 2009, ESORICS.
[95] Hairong Li,et al. Cognitive Impact of Banner Ad Characteristics: An Experimental Study , 1999 .
[96] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[97] G. McNair,et al. Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.
[98] Dan Boneh,et al. Protecting browser state from web privacy attacks , 2006, WWW '06.
[99] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[100] Roger Thompson,et al. Why spyware poses multiple threats to security , 2005, CACM.
[101] Mihai Chiriac. TALES FROM CLOUD NINE , 2009 .
[102] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[103] Kevin Borders,et al. Siren: catching evasive malware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[104] Lee Sherman,et al. Banner advertising: Measuring effectiveness and optimizing placement , 2001 .
[105] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[106] Mun Choon Chan,et al. Pervasive Random Beacon in the Internet for Covert Coordination , 2005, Information Hiding.
[107] Hao Wang,et al. NetSpy: Automatic Generation of Spyware Signatures for NIDS , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[108] Charles F. Hofacker,et al. World Wide Web banner advertisement copy testing , 1998 .
[109] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[110] Ethan R. Burris,et al. Negotiator confidence: The impact of self-efficacy on tactics and outcomes , 2006 .
[111] Richard Gatarski,et al. Breed better banners: Design automation through on-line interaction , 2002 .
[112] Karen Sweaney. The Oprah Effect , 2011 .
[113] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.