2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.91
|View full text |Cite
|
Sign up to set email alerts
|

Automated Spyware Detection Using End User License Agreements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…We now present a study investigating how data mining can be applied to prevent spyware [2]. The occurrence of spyware in applications available over the Internet has become very common.…”
Section: A New Generic MC Methodmentioning
confidence: 99%
“…We now present a study investigating how data mining can be applied to prevent spyware [2]. The occurrence of spyware in applications available over the Internet has become very common.…”
Section: A New Generic MC Methodmentioning
confidence: 99%
“…It have been shown that it is possible to use machine learning techniques to address the problem of EULA classification [12] [2]. Stateof-the-art within commercial tools involve one stand-alone application called EULAlyzer 2 and one website 3 called EULA Analyzer that includes the ability to analyze a EULA.…”
Section: Related Workmentioning
confidence: 99%
“…A comparison is made between EULA Analyzer and 15 machine learning algorithms [2], with the conclusion was that both the Support Vector Machines [6] and Naive Bayes Multinominal [10] algorithms performed significantly better than the state-of-the-art tool. Finally, it could also be added that the performance of these two algorithms have later been improved even more when utilized on an extended data set of EULAs [12].…”
Section: Related Workmentioning
confidence: 99%
“…A more recent study investigates the performance of random forests for the same type of problem, claiming that this algorithm outperforms some of the earlier mentioned algorithms on several problems [7]. We have previously outlined a large number of related studies, which have been conducted within the security research field [1].…”
Section: Related Workmentioning
confidence: 99%