Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
Uloženo v:
| Název: | Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html |
|---|---|
| Autoři: | Martin Boldt, Bengt Carlsson |
| Přispěvatelé: | The Pennsylvania State University CiteSeerX Archives |
| Zdroj: | http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf. |
| Rok vydání: | 2006 |
| Sbírka: | CiteSeerX |
| Popis: | User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1 |
| Druh dokumentu: | text |
| Popis souboru: | application/pdf |
| Jazyk: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832 |
| Dostupnost: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832 http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Přístupové číslo: | edsbas.C72B0D47 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Boldt%20M Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.C72B0D47 RelevancyScore: 836 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 836.004333496094 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Martin+Boldt%22">Martin Boldt</searchLink><br /><searchLink fieldCode="AR" term="%22Bengt+Carlsson%22">Bengt Carlsson</searchLink> – Name: Author Label: Contributors Group: Au Data: The Pennsylvania State University CiteSeerX Archives – Name: TitleSource Label: Source Group: Src Data: <i>http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf</i>. – Name: DatePubCY Label: Publication Year Group: Date Data: 2006 – Name: Subset Label: Collection Group: HoldingsInfo Data: CiteSeerX – Name: Abstract Label: Description Group: Ab Data: User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1 – Name: TypeDocument Label: Document Type Group: TypDoc Data: text – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832 – Name: URL Label: Availability Group: URL Data: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832<br />http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf – Name: Copyright Label: Rights Group: Cpyrght Data: Metadata may be used without restrictions as long as the oai identifier remains attached to it. – Name: AN Label: Accession Number Group: ID Data: edsbas.C72B0D47 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.C72B0D47 |
| RecordInfo | BibRecord: BibEntity: Languages: – Text: English Titles: – TitleFull: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Martin Boldt – PersonEntity: Name: NameFull: Bengt Carlsson – PersonEntity: Name: NameFull: The Pennsylvania State University CiteSeerX Archives IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2006 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science