2014
DOI: 10.4028/www.scientific.net/amm.539.390
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Lightweight BHO Hijack Technology for Online Behavior Monitoring

Abstract: With the increasingly wide range of Internet applications, Internet behavior monitoring aroused widespread concern. With BHO hijacking techniques to build an efficient monitoring system, not only can achieve real-time monitoring online behavior, but also has a lightweight characteristics, not only that, but also be able to effectively shield the site or filtered, to avoid unauthorized users from bad web , but also effectively prevent the illegal intrusion of the Web page. In the system design process, the appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 2 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?