X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (9082) 9082
Journal Article (2698) 2698
Magazine Article (2477) 2477
Newsletter (2475) 2475
Trade Publication Article (1047) 1047
Conference Proceeding (159) 159
Transcript (120) 120
Publication (94) 94
Book Review (70) 70
Government Document (46) 46
Report (42) 42
Streaming Video (32) 32
Web Resource (28) 28
Book / eBook (23) 23
Book Chapter (21) 21
Dissertation (14) 14
Data Set (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
spyware (17397) 17397
computer software industry (2508) 2508
computer viruses (2374) 2374
safety and security measures (1996) 1996
computer security (1540) 1540
patents (1497) 1497
internet (1377) 1377
computer crimes (1304) 1304
network security (1290) 1290
cyberterrorism (1288) 1288
methods (1152) 1152
intellectual property (1133) 1133
reports (1129) 1129
malware (1027) 1027
data security (1019) 1019
computer hackers (868) 868
analysis (805) 805
anti-virus software (785) 785
forecasts and trends (744) 744
usage (670) 670
phishing (659) 659
software (634) 634
identity theft (530) 530
internet crime (528) 528
data encryption (511) 511
research (476) 476
web sites (455) 455
security management (442) 442
control (417) 417
laws, regulations and rules (398) 398
electronic mail systems (384) 384
technology application (367) 367
computer science (353) 353
computer science, information systems (352) 352
computer industry (344) 344
smart phones (338) 338
social networks (336) 336
product introduction (327) 327
investigations (326) 326
privacy (316) 316
spam (305) 305
threats (305) 305
prevention (298) 298
internet fraud (293) 293
machine learning (286) 286
banks (284) 284
operating systems (277) 277
periodical publishing (273) 273
management (259) 259
statistics (259) 259
cloud computing (254) 254
security software (254) 254
fraud (251) 251
mobile devices (243) 243
computers (238) 238
distribution (232) 232
surveys (210) 210
algorithms (206) 206
schools (194) 194
smartphones (190) 190
artificial intelligence (187) 187
index medicus (187) 187
mobile applications (185) 185
data integrity (182) 182
software industry (178) 178
web browsers (178) 178
personal information (169) 169
political aspects (169) 169
communications industry (164) 164
detectors (164) 164
telecommunications services industry (163) 163
consumer protection (157) 157
security (157) 157
internet software (154) 154
banking industry (153) 153
services (153) 153
systems and data security software (153) 153
cases (152) 152
home banking services (144) 144
computer science, software engineering (143) 143
espionage (143) 143
health aspects (143) 143
telecommunications (141) 141
researchers (139) 139
denial of service attacks (138) 138
computer science, general (133) 133
education (131) 131
computer science, theory & methods (130) 130
access control (128) 128
information services (128) 128
evaluation (126) 126
personal computers (126) 126
trends (126) 126
automation (124) 124
hackers (124) 124
leadership (124) 124
security services (124) 124
studies (124) 124
internet service providers (117) 117
customer services (115) 115
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (31) 31
Robarts - Stacks (2) 2
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (17391) 17391
Spanish (16) 16
Japanese (10) 10
German (6) 6
Chinese (5) 5
French (4) 4
Korean (3) 3
Turkish (3) 3
Portuguese (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal of Parallel and Distributed Computing, ISSN 0743-7315, 10/2018, Volume 120, p. 23
Internet of Things (IoT) devices are extensively used in modern industries combined with the conventional industrial control system (ICS) network through the... 
Analysis | Detectors | Control systems | Models | Spyware
Journal Article
Database and Network Journal, ISSN 0265-4490, 06/2008, Volume 38, Issue 3, p. 24
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 02/2012, Volume 44, Issue 2, pp. 1 - 42
Anti-virus vendors are confronted with a multitude of potentially malicious samples today. Receiving thousands of new samples every day is not uncommon. The... 
Dynamic analysis | malware | Malware | COMPUTER SCIENCE, THEORY & METHODS | Security | INFORMATION | Control | Data security | Spyware | Methods | Receiving | Automated | Signatures | Computation | Dynamics
Journal Article
PC Quest, ISSN 0971-216X, 06/2016
Journal Article
PC Quest, ISSN 0971-216X, 02/2016
Journal Article
Software World, ISSN 0038-0652, 03/2016, Volume 47, Issue 2, p. 10
Journal Article
Proceedings of the 14th ACM conference on computer and communications security, ISSN 1543-7221, 10/2007, pp. 116 - 127
Malicious programs spy on users' behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player,... 
malware analysis | malware detection | spyware | dynamic taint analysis | Malware analysis | Malware detection | Spyware | Dynamic taint analysis
Conference Proceeding
Software World, ISSN 0038-0652, 05/2019, Volume 50, Issue 3, p. 26
Journal Article
Journal Article
Journal of Hazardous Materials, ISSN 0304-3894, 01/2018, Volume 342, p. 41
* Heavy metals can be adsorbed on TiO.sub.2 NP surface in sediment. * TiO.sub.2 NPs in sediments changed the speciation distribution of heavy metals. *... 
Asian clam | Spyware | Sediments (Geology) | Heavy metals | Nanoparticles | Adsorption
Journal Article
Information Sciences, ISSN 0020-0255, 05/2013, Volume 231, pp. 64 - 82
Malware can be defined as any type of malicious code that has the potential to harm a computer or network. The volume of malware is growing faster every year... 
Data mining | Supervised learning | Malware detection | Computer security | Machine learning | INTRUSION DETECTION | CRITERIA | INFORMATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | CLASSIFICATION | ALGORITHMS | CLASSIFIERS | FEATURE-SELECTION | KERNEL | Spyware | Analysis
Journal Article
Database and Network Journal, ISSN 0265-4490, 12/2018, Volume 48, Issue 6, p. 25
Journal Article
Journal of Petroleum Science and Engineering, ISSN 0920-4105, 09/2014, Volume 121, p. 142
Journal Article
European Company and Financial Law Review, ISSN 1613-2548, 01/2005, Volume 2, Issue 1, pp. 1 - 19
Journal Article
eBook
Journal of Petroleum Science and Engineering, ISSN 0920-4105, 02/2019, Volume 173, p. 547
This study investigates the critical parameters which influence the residual oil recovery by alkaline-surfactant-alternated-gas/CO.sub.2 (ASAG) flooding. A... 
Petroleum mining | Petroleum products | Surface active agents | Analysis | Floods | Spyware
Journal Article
Journal of Corporate Accounting & Finance, ISSN 1044-8136, 03/2015, Volume 26, Issue 3, pp. 7 - 14
Malware is software that causes harm to the victim. This article explains several aspects of malware, including ransomware, mobile devices, and special issues... 
Spyware
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.