Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html

Uloženo v:
Podrobná bibliografie
Název: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
Autoři: Martin Boldt, Bengt Carlsson
Přispěvatelé: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf.
Rok vydání: 2006
Sbírka: CiteSeerX
Popis: User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1
Druh dokumentu: text
Popis souboru: application/pdf
Jazyk: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
Dostupnost: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Přístupové číslo: edsbas.C72B0D47
Databáze: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Boldt%20M
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.C72B0D47
RelevancyScore: 836
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 836.004333496094
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Martin+Boldt%22">Martin Boldt</searchLink><br /><searchLink fieldCode="AR" term="%22Bengt+Carlsson%22">Bengt Carlsson</searchLink>
– Name: Author
  Label: Contributors
  Group: Au
  Data: The Pennsylvania State University CiteSeerX Archives
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf</i>.
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2006
– Name: Subset
  Label: Collection
  Group: HoldingsInfo
  Data: CiteSeerX
– Name: Abstract
  Label: Description
  Group: Ab
  Data: User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: text
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
– Name: URL
  Label: Availability
  Group: URL
  Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832<br />http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.C72B0D47
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.C72B0D47
RecordInfo BibRecord:
  BibEntity:
    Languages:
      – Text: English
    Titles:
      – TitleFull: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Martin Boldt
      – PersonEntity:
          Name:
            NameFull: Bengt Carlsson
      – PersonEntity:
          Name:
            NameFull: The Pennsylvania State University CiteSeerX Archives
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2006
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf
              Type: main
ResultId 1