2022
DOI: 10.1007/978-981-16-5652-1_31
|View full text |Cite
|
Sign up to set email alerts
|

Adware and Spyware Detection Using Classification and Association

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Upon downloading on the victim's device, it secretly monitors and records all the activities of the victim such as login name and password credentials, credit card and bank details, and browsing and searching history. This information is then transferred to the attacker via the Internet who uses this information for his own benefits or sells it to a third party such as advertisers, spammers, scammers, or hackers [34] . Spyware can also cause other severe damages such as locking a victim's device, disabling antivirus programs or security related notifications, recording live videos and taking pictures using a mobile camera (front and back camera), viewing device specifications, installing or uninstalling apps, recording conversations using the microphone, track victim's current geographic location and transferred it to the third party, record incoming and outgoing calls and so on.…”
Section: Background and Financial Impact Of Malware Attacks On Societymentioning
confidence: 99%
“…Upon downloading on the victim's device, it secretly monitors and records all the activities of the victim such as login name and password credentials, credit card and bank details, and browsing and searching history. This information is then transferred to the attacker via the Internet who uses this information for his own benefits or sells it to a third party such as advertisers, spammers, scammers, or hackers [34] . Spyware can also cause other severe damages such as locking a victim's device, disabling antivirus programs or security related notifications, recording live videos and taking pictures using a mobile camera (front and back camera), viewing device specifications, installing or uninstalling apps, recording conversations using the microphone, track victim's current geographic location and transferred it to the third party, record incoming and outgoing calls and so on.…”
Section: Background and Financial Impact Of Malware Attacks On Societymentioning
confidence: 99%