Conferences related to Spyware

Back to Top

2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

NTMS'2018 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2016 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2015 7th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2015 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field.

  • 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2014 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2012 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)

    NTMS'2011 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas.

  • 2009 3rd International Conference on New Technologies, Mobility and Security (NTMS)

    New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce

  • 2008 New Technologies, Mobility and Security (NTMS)

    NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and t


2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)

This conference covers many dimensions of dependability and fault tolerance, encompassingfundamental theoretical approaches, practical experimental projects, and commercialcomponents and systems. As applications of computing systems have permeated into allaspects of daily life, the dependability of computing systems has become increasingly critical.This symposium provides a forum for countries around the Pacific Rim and other areas of theworld to exchange ideas for improving the dependability of computing systems.


More Conferences

Periodicals related to Spyware

Back to Top

Antennas and Wireless Propagation Letters, IEEE

IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


More Periodicals


Xplore Articles related to Spyware

Back to Top

A framework for detection and prevention of novel keylogger spyware attacks

2013 7th International Conference on Intelligent Systems and Control (ISCO), 2013

Cyber world is susceptible to various attacks, out of which malware attack is the malignant one. It is very difficult to detect and defend. A keylogger spyware contains both scripts keylogger and spyware in a single program. The functionality of this program is that it can capture all key strokes which are pressed by a system user and stores them ...


The Spyware Used in Intimate Partner Violence

2018 IEEE Symposium on Security and Privacy (SP), 2018

Survivors of intimate partner violence increasingly report that abusers install spyware on devices to track their location, monitor communications, and cause emotional and physical harm. To date there has been only cursory investigation into the spyware used in such intimate partner surveillance (IPS). We provide the first in-depth study of the IPS spyware ecosystem. We design, implement, and evaluate a ...


Resolving the menace of spyware through implementations in application layer and network layer

2012 Students Conference on Engineering and Systems, 2012

Spyware, a potentially unwanted program (PUP), monitors the online activity of the users and introduces serious privacy disclosures and potential security breach to the systems. Various measures are adopted to counteract it and presently we hugely rely on the various antispyware softwares. However, the existing spyware tools are stateless because if any new system is added to a network, the ...


Comparing Anti-Spyware products — A different approach

2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, 2011

Spyware is one of the biggest emerging threats that can target both home users and organisations simultaneously. Lots of Anti-Spyware products are available in the market which can protect from Spyware threat. Existing research shows that Spyware causes financial loss and efforts are being made to test Spyware to propose the best Anti-Spyware products to the end users. This research ...


Click based Graphical CAPTCHA to thwart spyware attack

2015 IEEE International Advance Computing Conference (IACC), 2015

Software that gathers information regarding the computer's use secretly and conveys that information to a third party is Spyware. This paper proposes a click based Graphical CAPTCHA to overcome the spyware attacks. In case of traditional Text-Based CAPTCHA's user normally enters disorder strings to form a CAPTCHA, the same is stored in the key loggers where spywares can decode it ...


More Xplore Articles

Educational Resources on Spyware

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Spyware"

IEEE-USA E-Books

  • A framework for detection and prevention of novel keylogger spyware attacks

    Cyber world is susceptible to various attacks, out of which malware attack is the malignant one. It is very difficult to detect and defend. A keylogger spyware contains both scripts keylogger and spyware in a single program. The functionality of this program is that it can capture all key strokes which are pressed by a system user and stores them in a log file, the spyware email this log file to the designer's specified address. It is very harmful for those systems which are used in daily transaction process i.e. online banking system. The prevention of these attacks is necessary. In this paper we have proposed a framework for detection and prevention of novel keylogger spyware attack. It is capable to defend against such kind of attacks.

  • The Spyware Used in Intimate Partner Violence

    Survivors of intimate partner violence increasingly report that abusers install spyware on devices to track their location, monitor communications, and cause emotional and physical harm. To date there has been only cursory investigation into the spyware used in such intimate partner surveillance (IPS). We provide the first in-depth study of the IPS spyware ecosystem. We design, implement, and evaluate a measurement pipeline that combines web and app store crawling with machine learning to find and label apps that are potentially dangerous in IPS contexts. Ultimately we identify several hundred such IPS-relevant apps. While we find dozens of overt spyware tools, the majority are "dual-use" apps - they have a legitimate purpose (e.g., child safety or anti-theft), but are easily and effectively repurposed for spying on a partner. We document that a wealth of online resources are available to educate abusers about exploiting apps for IPS. We also show how some dual-use app developers are encouraging their use in IPS via advertisements, blogs, and customer support services. We analyze existing anti-virus and anti-spyware tools, which universally fail to identify dual-use apps as a threat.

  • Resolving the menace of spyware through implementations in application layer and network layer

    Spyware, a potentially unwanted program (PUP), monitors the online activity of the users and introduces serious privacy disclosures and potential security breach to the systems. Various measures are adopted to counteract it and presently we hugely rely on the various antispyware softwares. However, the existing spyware tools are stateless because if any new system is added to a network, the system is made to have its own antispyware software methods in order to safeguard itself. This paper thus proposes a new technique wherein the antispyware software is done away with and in place we utilise the fundamentals of the network layer and the application layer to eliminate the spyware. The technique scans the various outgoing HTTP requests at the browser itself and then proposes a new addendum at both the DNS and the network layer in order to detect the presence of spyware and filter off the potentially unwanted program.

  • Comparing Anti-Spyware products — A different approach

    Spyware is one of the biggest emerging threats that can target both home users and organisations simultaneously. Lots of Anti-Spyware products are available in the market which can protect from Spyware threat. Existing research shows that Spyware causes financial loss and efforts are being made to test Spyware to propose the best Anti-Spyware products to the end users. This research focuses on different aspects of Anti-Spyware testing that the test should be conducted in real life environment in which the users operate. Anti-Spyware programs are selected by carefully researching through existing test result s conducted by different internet security companies. The products are evaluated and tested to propose the suitable products to the end users. Some recommendations are also proposed on the basis of this research to help end user to increase their Spyware security.

  • Click based Graphical CAPTCHA to thwart spyware attack

    Software that gathers information regarding the computer's use secretly and conveys that information to a third party is Spyware. This paper proposes a click based Graphical CAPTCHA to overcome the spyware attacks. In case of traditional Text-Based CAPTCHA's user normally enters disorder strings to form a CAPTCHA, the same is stored in the key loggers where spywares can decode it easily. To overcome this, Click-Based Graphical CAPTCHA uses a unique way of verification where user clicks on a sequence of images to form a CAPTCHA, and that sequence is stored in pixels with a random predefined order. This paper also analyzes the proposed scheme in terms of usability, security and performance.

  • A graphical password against spyware and shoulder-surfing attacks

    Users may have various login ids that will be hard to remember their passwords and alphanumeric passwords are difficult to remember. One solution is to use graphical passwords that are more secure. Some threats of Internet security are spyware and shoulder-surfing attacks. This paper presents a new scheme for graphical password that uses images that are unexplainable and have larger password space. The proposed scheme is also resistant to spyware and shoulder- surfing attacks.

  • Taint-Graph-Based for Automatic Spyware Analysis

    Spyware is a kind of malicious code that is installed on victims' machines without their content. They spy on the users' behavior and compromise their privacy, while transmitting sensitive information to some remote servers. Current anti-spyware tools are similar to anti-virus products in that they identify known spyware by comparing the binary image to a database of signatures. Unfortunately, these techniques cannot distinguish some novel spyware, require frequent updates to signature databases, and are easy to elude by code obfuscation. In this paper, we introduce a novel analysis approach that tracks the sensitive information flow through the system. Trough our analysis to obtained data, we can identify unknown program or components as spyware and gain detail information. For example, which sensitive data is leaked and where it is sent.

  • Interests-Based Spyware Detection

    Spyware is a rapidly spreading security issue. Traditional spyware detection can mainly be classified into two categories: signature based detection and behavior based detection. The former is not able to detect unknown spyware and variants of known spyware. The latter fails when spyware attempts to blend in with legitimate behavior. This paper presents a novel spyware detection technique which is based on an abstract characterization of the interests of spyware programs. For sensitive and critical data, we monitor two kinds of actions which are general behaviors for spyware, copy-and-paste and transmission, performed by every program. Then with backward cloud generator we get the interests of every program. If the interests of one program are just the sensitive and critical data, we can tell the program is the spyware program. The experiment verifies the feasibility of our method.

  • Anti-spyware Security Design Patterns

    Spyware is deemed a big danger to the privacy and secrecy of both individuals and firms, it frequently results in the damage and loss of electronic data stored on all types of computers. The main challenges in designing anti- spyware systems are the need for updating data describing spywares and changing the structure of old programs to detect new or unknown spywares. In this paper, we aimed to propose a security pattern for spyware detection. We achieved our objective by introducing a framework for anti-spyware system that combine data mining and design patterns in creating security patterns able to detect and classify spyware efficiently. The proposed anti-spyware system is characterized by its reusability, in sense that it can modify itself for any new or unknown spyware. The experimental results of the proposed approach outperform all the previous competing approaches.

  • Spyware Knowledge in Anti-Spyware Program Adoption: Effects on Risk, Trust, and Intention to Use

    Spyware is a serious threat, posing severe privacy and security issues. The best way for users to reduce the threat from spyware is to adopt anti-spyware programs. While previous studies have identified various determinants of anti- spyware adoption, some factors have not yet been examined. Based on the theory of reasoned action, this study presents a parsimonious model for users' intention to adopt anti-spyware programs. Structural equation modeling is used to empirically test a model. Every hypothesis is supported except the relationship between Internet familiarity and knowledge of spyware. This study concludes with discussions and implications for research and practice..



Standards related to Spyware

Back to Top

No standards are currently tagged "Spyware"


Jobs related to Spyware

Back to Top