{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T05:33:44Z","timestamp":1741152824308,"version":"3.38.0"},"posted":{"date-parts":[[2025]]},"group-title":"SSRN","reference-count":100,"publisher":"Elsevier BV","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.2139\/ssrn.5091771","type":"posted-content","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:48:18Z","timestamp":1741085298000},"source":"Crossref","is-referenced-by-count":0,"title":["A Spyware Platform and Predictive Models for Monitoring Computers"],"prefix":"10.2139","author":[{"given":"Darlan","family":"Noetzold","sequence":"first","affiliation":[]},{"given":"Anubis","family":"Rosseto","sequence":"additional","affiliation":[]},{"given":"Valderi","family":"Leithardt","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"ref1","author":"S Abdelwahab","year":"2016","journal-title":"Fogmq: A message broker system for enabling distributed, internet-scale iot applications over heterogeneous cloud platforms"},{"issue":"17","key":"ref2","doi-asserted-by":"crossref","DOI":"10.3390\/s23177541","article-title":"Enhancing network visibility and security with advanced port scanning techniques","author":"R Abu Bakar","year":"2023","journal-title":"Sensors"},{"key":"ref3","author":"Activtrak","year":"2023","journal-title":"Workforce analytics for productivity management"},{"key":"ref4","article-title":"A new performance evaluation metric for classifiers: Polygon area metric","author":"O Aydemir","year":"2020","journal-title":"Journal of Classification"},{"key":"ref5","first-page":"98","author":"A E Bagaskara","year":"2020","journal-title":"Performance analysis of message broker for communication in fog computing"},{"key":"ref6","author":"Balbix","year":"2021","journal-title":"Dossi\ufffd -intoler\ufffdncia: do \ufffddio \ufffd barb\ufffdrie"},{"key":"ref7","author":"C Basumallick","year":"2022","journal-title":"What is spyware? definition, types, removal, and prevention best practices in 2022"},{"issue":"12","key":"ref8","first-page":"1","article-title":"Evaluating the Redis In-Memory Cache for Distributed Storage Systems","volume":"8","author":"M Begnum","year":"2020","journal-title":"Journal of Computer and Communications"},{"key":"ref9","author":"K P Bennett","year":"2022","journal-title":"Support vector machines: Hype or hallelujah?"},{"key":"ref10","author":"T B Brown","year":"2020","journal-title":"Language models are few-shot learners"},{"key":"ref11","author":"D B Carrier","year":"2022","journal-title":"How to detect running malware -intro to incident response triage"},{"key":"ref12","first-page":"83","article-title":"Role of data acquisition, sensors, and actuators in mechatronics industry","author":"H K Channi","year":"2024","journal-title":"Computational Intelligent Techniques in Mechatronics"},{"key":"ref13","article-title":"Uncertainty-aware cross-modal alignment for hate speech detection","author":"L Chen","year":"2024","journal-title":"Proceedings of the Language Resources and Evaluation Conference (LREC)"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1145\/371920.372156","article-title":"An admission control scheme for predictable server response time for web accesses","author":"X Chen","year":"2001","journal-title":"Proceedings of the 10th international conference on World Wide Web"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"C Cortes","year":"1995","journal-title":"Machine Learning"},{"issue":"1","key":"ref16","article-title":"Uma aplicac \ufffd\ufffdo para o ensino da l\ufffdngua portuguesa para surdos utilizando o sensorlibras*1","author":"R Da","year":"2009","journal-title":"Brazilian Symposium on Computers in Education (Simp\ufffdsio Brasileiro de Inform\ufffdtica na Educac \ufffd\ufffdo -SBIE)"},{"key":"ref17","author":"M Dadvar","year":"2012","journal-title":"Improved cyberbullying detection using gender information"},{"key":"ref18","first-page":"1","author":"D L De Oliveira","year":"2019","journal-title":"Performance evaluation of mqtt brokers in the internet of things for smart cities"},{"key":"ref19","article-title":"Desktime","author":"; Desktime","year":"2024","journal-title":"A review intrusion protection system on the internet\/network"},{"key":"ref20","first-page":"123","article-title":"Flywaydb: An automated database migration tool","author":"J Doe","year":"2019","journal-title":"Proceedings of the International Conference on Database Systems"},{"key":"ref21","article-title":"Overview of the task on automatic misogyny identification at ibereval 2018","author":"E Fersini","year":"2018","journal-title":"Database Management Review"},{"issue":"2","key":"ref22","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1080\/17512786.2023.2288918","article-title":"The promotion of hate speech: From a media and journalism perspective","volume":"18","author":"Elias Said-Hung","year":"2024","journal-title":"Journalism Practice"},{"key":"ref23","author":"Engineering","year":"2022","journal-title":"Api gateway: o que \ufffd e por que usar com microsservic \ufffdos?"},{"issue":"42","key":"ref24","doi-asserted-by":"crossref","first-page":"6221","DOI":"10.3233\/JIFS-212788","article-title":"Long short-term memory stacking model to predict the number of cases and deaths caused by COVID-19","volume":"6","author":"F Fernandes","year":"2022","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref25","year":"2019","journal-title":"Linguistic datasets for portuguese: conjuntos de dados lingu\ufffdsticos para portugu\ufffds"},{"key":"ref26","author":"Flask","year":"2022","journal-title":"Flask web development"},{"key":"ref27","author":"E Forzinetti","year":"2024","journal-title":"Indicators for characterising online hate speech and its automatic detection"},{"key":"ref28","author":"Fsense","year":"2023","journal-title":"fsense: Sistema de monitoramento pr\ufffdtico e preciso para estac \ufffd\ufffdes de trabalho"},{"key":"ref29","author":"L P L F\ufffdvero","year":"2022","journal-title":"An\ufffdlise de dados: modelagem multivariada para tomada de decis\ufffdes"},{"key":"ref30","author":"A Ganguly","year":"2024","journal-title":"Masonperplexity at multimodal hate speech event detection 2024: Hate speech and target detection using transformer ensembles"},{"key":"ref31","first-page":"1","article-title":"Performance Evaluation of Redis Cache in Web Service","author":"P Gao","year":"2018","journal-title":"IEEE International Conference on Communications Workshops (ICC Workshops)"},{"issue":"5","key":"ref32","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12051083","article-title":"OCR applied for identification of vehicles with irregular documentation using IoT","volume":"12","author":"L A Glasenapp","year":"2023","journal-title":"Electronics"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/CSR57506.2023.10224918","article-title":"Attacking a packet analyzer: Caronte case study","author":"D Granata","year":"2023","journal-title":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"T Hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"ref35","article-title":"Thoth: An intelligent model for assisting individuals with suicidal ideation","volume":"233","author":"W F Heckler","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122697","article-title":"Cybersecurity threats in fintech: A systematic review","volume":"241","author":"D Javaheri","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"ref37","article-title":"Aast-nlp at multimodal hate speech event detection 2024: A multimodal approach","author":"E Johnson","year":"2024","journal-title":"Proceedings of the Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE)"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.3389\/fpsyg.2021.633031","article-title":"Electronic performance monitoring in the digital workplace: conceptualization, review of effects and moderators, and future research opportunities","volume":"12","author":"T Kalischko","year":"2021","journal-title":"Frontiers in psychology"},{"key":"ref39","author":"D Kansaon","year":"2018","journal-title":"Brasnam2018-dataset-analise-de-sentimentos-em-tweets-em-portuguesbrasileiro"},{"key":"ref40","author":"Kickidler","year":"2024","journal-title":"Programa para monitorar e controlar computadores de funcion\ufffdrios"},{"key":"ref41","first-page":"1","article-title":"Classification of spyware from network packets with decision trees using recursive feature elimination (rfe)","author":"I Kilic","year":"2024","journal-title":"2024 32nd Signal Processing and Communications Applications Conference (SIU)"},{"key":"ref42","first-page":"1","article-title":"A new approach to spyware classification using a 1d-gaussian filter on network packets","author":"I Kilic","year":"2024","journal-title":"2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP)"},{"issue":"6","key":"ref43","article-title":"Optimized EWT-Seq2Seq-LSTM with attention mechanism to insulators fault prediction","volume":"23","author":"A C R Klaar","year":"2023","journal-title":"Sensors"},{"issue":"7","key":"ref44","article-title":"Structure optimization of ensemble learning methods and seasonal decomposition approaches to energy price forecasting in Latin America: A case study about Mexico","volume":"16","author":"A C R Klaar","year":"2023","journal-title":"Energies"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/3631700.3664879","article-title":"Following topics across all apps and media formats: Mobile keyword tracking as a privacy-friendly data source in mobile media research","author":"P Krieter","year":"2024","journal-title":"Adjunct Proceedings of the 32nd ACM Conference on User Modeling, Adaptation and Personalization, UMAP Adjunct '24"},{"key":"ref46","first-page":"1","article-title":"Use of data replication in wsns directed to special needs","author":"V R Q Leithardt","year":"2010","journal-title":"2010 IEEE International Conference on Communications Workshops"},{"issue":"2","key":"ref47","doi-asserted-by":"crossref","first-page":"21","DOI":"10.5383\/JUSPN.05.02.004","article-title":"Privacy management solution in ubiquitous environments using percontrol","volume":"5","author":"V R Leithardt 1","year":"2014","journal-title":"Journal of Ubiquitous Systems & Pervasive Networks"},{"key":"ref48","author":"A S Llc","year":"2024","journal-title":"Staffcop"},{"issue":"4","key":"ref49","first-page":"123","article-title":"Deep learning for hate speech detection: a comparative study","volume":"9","author":"J S Malik","year":"2024","journal-title":"International Journal of Data Science and Analytics"},{"issue":"22","key":"ref50","doi-asserted-by":"crossref","first-page":"10052","DOI":"10.1073\/pnas.92.22.10052","article-title":"New trends in natural language processing: statistical natural language processing","volume":"92","author":"M Marcus","year":"1995","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"4","key":"ref51","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.3233\/JIFS-211126","article-title":"Comparison of artificial intelligence techniques to failure prediction in contaminated insulators based on leakage current","volume":"42","author":"A Medeiros","year":"2022","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113725","article-title":"Detecting and visualizing hate speech in social media: A cyber watchdog for surveillance","volume":"161","author":"S Modha","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1508","DOI":"10.1016\/j.renene.2020.10.126","article-title":"Hybrid multi-stage decomposition with parametric model applied to wind speed forecasting in brazilian northeast","volume":"164","author":"S R Moreno","year":"2021","journal-title":"Renewable Energy"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1016\/j.energy.2024.130493","article-title":"Enhancing wind speed forecasting through synergy of machine learning, singular spectral analysis, and variational mode decomposition","volume":"292","author":"S R Moreno","year":"2024","journal-title":"Energy"},{"key":"ref55","first-page":"1","article-title":"Android trojan horse spyware attack: A practical implementation","author":"C M Mwange","year":"2024","journal-title":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)"},{"key":"ref56","author":"N-Able","year":"2021","journal-title":"What is dns blocking, and what should you know about dns security?"},{"key":"ref57","author":"D Noetzold","year":"2024","journal-title":"spyware-api"},{"key":"ref58","article-title":"Jvm optimization: An empirical analysis of jvm configurations for enhanced web application performance","volume":"28","author":"D Noetzold","journal-title":"SoftwareX"},{"issue":"1","key":"ref59","doi-asserted-by":"crossref","first-page":"508","DOI":"10.5753\/jisa.2024.4509","article-title":"Enhancing infrastructure observability: Machine learning for proactive monitoring and anomaly detection","volume":"15","author":"D Noetzold","year":"2024","journal-title":"Journal of Internet Services and Applications"},{"key":"ref60","first-page":"1","article-title":"Use of spyware integrated with prediction models for computer monitoring","author":"D Noetzold","year":"2023","journal-title":"2023 18th Iberian Conference on Information Systems and Technologies (CISTI)"},{"key":"ref61","author":"F Oliveira","year":"2024","journal-title":"Tupy-e: Detecting hate speech in brazilian portuguese social media with a novel dataset and comprehensive analysis of models"},{"key":"ref62","author":"Openai","year":"2021","journal-title":"Openai api"},{"issue":"2","key":"ref63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3371276","article-title":"Mandola: A big-data processing and visualization platform for monitoring and detecting online hate speech","volume":"20","author":"Paschalides","year":"2020","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"30575","DOI":"10.1109\/ACCESS.2023.3258973","article-title":"Assessing the impact of contextual information in hate speech detection","volume":"11","author":"J M P\ufffdrez","year":"2023","journal-title":"IEEE Access"},{"key":"ref65","first-page":"110","article-title":"Spearmint: A decentralized solution for recording evidence of cyberbullying","author":"J L D Pinto","year":"2023","journal-title":"New Trends in Disruptive Technologies"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"2012","DOI":"10.1109\/ICACCS60874.2024.10717313","article-title":"Insightguard: Machine learning empowered selfmonitoring system for vision centric applications","volume":"1","author":"R","year":"2024","journal-title":"2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS)"},{"key":"ref67","first-page":"1","article-title":"Investigation of data interception and its vulnerabilities in http and https networks through packet sniffers","author":"A Raj","year":"2024","journal-title":"2024 2nd International Conference on Networking and Communications (ICNWC)"},{"issue":"204","key":"ref68","first-page":"1","article-title":"A comprehensive review on automatic hate speech detection in the age of the transformer","volume":"14","author":"G Ramos","year":"2024","journal-title":"Social Network Analysis and Mining"},{"key":"ref69","author":"M H D M Ribeiro"},{"issue":"19","key":"ref70","article-title":"Electricity price forecasting based on self-adaptive decomposition and heterogeneous ensemble learning","journal-title":"Energies"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.comnet.2016.07.014","article-title":"Situation awareness and computational intelligence in opportunistic networks to support the data transmission of urban sensing applications","volume":"111","author":"C O Rolim","year":"2016","journal-title":"Computer Networks"},{"key":"ref72","journal-title":"Cyber-physical systems for Mobile Opportunistic Networking in Proximity (MNP)"},{"issue":"13","key":"ref73","article-title":"Enhancing monitoring performance: A microservices approach to monitoring with spyware techniques and prediction models","author":"A G D M Rossetto","year":"2024","journal-title":"Sensors"},{"issue":"4","key":"ref74","doi-asserted-by":"crossref","first-page":"101","DOI":"10.52088\/ijesty.v4i4.581","article-title":"Sentiment analysis of user reviews on bsi mobile and action mobile applications on the google play store using multinomial naive bayes algorithm","volume":"4","author":"B D Samudera","year":"2024","journal-title":"International Journal of Engineering, Science and Information Technology"},{"key":"ref75","author":"Scikitlearn","year":"2022","journal-title":"Getting started"},{"key":"ref76","author":"S Security","year":"2022","journal-title":"Spring security"},{"key":"ref77","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2023.109269","article-title":"Ensemble learning methods using the Hodrick-Prescott filter for fault forecasting in insulators of the electrical power grids","volume":"152","author":"L O Seman","year":"2023","journal-title":"International Journal of Electrical Power & Energy Systems"},{"issue":"2","key":"ref78","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1108\/JICES-04-2020-0038","article-title":"Empowering employees: the other side of electronic performance monitoring","volume":"19","author":"K Sherif","year":"2021","journal-title":"Communication and Ethics in Society"},{"issue":"2","key":"ref79","first-page":"45","article-title":"A comparative study: Undertow vs. tomcat for web application performance","volume":"10","author":"J Smith","year":"2022","journal-title":"Journal of Web Engineering"},{"issue":"3","key":"ref80","first-page":"45","article-title":"Automated database migrations with flywaydb","volume":"25","author":"J Smith","year":"2022","journal-title":"Database Management Review"},{"key":"ref81","article-title":"Predict: Multi-agent-based debate simulation for generalized hate speech detection","author":"J Smith","year":"2024","journal-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing"},{"issue":"16","key":"ref82","doi-asserted-by":"crossref","DOI":"10.3390\/s22166121","article-title":"Fault prediction based on leakage current in contaminated insulators using enhanced time series forecasting models","volume":"22","author":"N F Sopelsa Neto","year":"2022","journal-title":"Sensors"},{"key":"ref83","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2023.108982","article-title":"Hybrid-YOLO for classification of insulators defects in transmission lines based on UAV","volume":"148","author":"B J Souza","year":"2023","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref84","author":"Springboot","year":"2022","journal-title":"Spring boot reference documentation"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"33980","DOI":"10.1109\/ACCESS.2022.3161506","article-title":"Analysis of the ultrasonic signal in polymeric contaminated insulators through ensemble learning methods","volume":"10","author":"S F Stefenon","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"ref86","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.3233\/JIFS-201279","article-title":"Photovoltaic power forecasting using wavelet neuro-fuzzy for active solar trackers","volume":"40","author":"S F Stefenon","year":"2021","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1016\/j.energy.2023.127350","article-title":"Wavelet-Seq2Seq-LSTM with attention for time series forecasting of level of dams in hydroelectric power plants","volume":"274","author":"S F Stefenon","year":"2023","journal-title":"Energy"},{"issue":"3","key":"ref88","doi-asserted-by":"crossref","DOI":"10.3390\/en16031371","article-title":"Aggregating prophet and seasonal trend decomposition for time series forecasting of Italian electricity spot prices","volume":"16","author":"S F Stefenon","year":"2023","journal-title":"Energies"},{"issue":"5","key":"ref89","doi-asserted-by":"crossref","first-page":"6655","DOI":"10.3233\/JIFS-190013","article-title":"Fault diagnosis of insulators from ultrasound detection using neural networks","volume":"37","author":"S F Stefenon","year":"2019","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"15","key":"ref90","doi-asserted-by":"crossref","first-page":"3501","DOI":"10.1049\/gtd2.12886","article-title":"Optimized hybrid YOLOu-Quasi-ProtoPNet for insulators classification","volume":"17","author":"S F Stefenon","year":"2023","journal-title":"IET Generation, Transmission & Distribution"},{"key":"ref91","author":"Tst","year":"2017","journal-title":"Principais ameac \ufffdas (key logger, screen logger, teclado virtual falso)"},{"key":"ref92","article-title":"Attention is all you need","author":"A Vaswani","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref93","author":"Z Waseem","year":"2016","journal-title":"Are you a racist or am i seeing things? annotator influence on hate speech detection on twitter"},{"key":"ref94","author":"L Wieser","year":"2023","journal-title":"When are employers interested in electronic performance monitoring? results from a factorial survey experiment"},{"issue":"9","key":"ref95","doi-asserted-by":"crossref","DOI":"10.3390\/a16090396","article-title":"Recency, frequency, monetary value, clustering, and internal and external indices for customer segmentation from retail data","volume":"16","author":"H J Wilbert","year":"2023","journal-title":"Algorithms"},{"key":"ref96","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2023.109579","article-title":"Optimized hybrid ensemble learning approaches applied to very short-term load forecasting","volume":"155","author":"M Yamasaki","year":"2024","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref97","first-page":"1","article-title":"Hate crimes against asian americans","author":"Y Zhang","year":"2021","journal-title":"American journal of criminal justice"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/ICWS.2010.10","article-title":"Distributed qos evaluation for real-world web services","author":"Z Zheng","year":"2010","journal-title":"2010 IEEE International Conference on Web Services"},{"issue":"1","key":"ref99","first-page":"325","article-title":"A comparative review on deep learning models for text classification","volume":"19","author":"M Zulqarnain","year":"2020","journal-title":"Indones. J. Electr. Eng. Comput. Sci"},{"key":"ref100","author":"\ufffdlvarez Carmona","year":"2018","journal-title":"Overview of mex-a3t at ibereval 2018: Authorship and aggressiveness analysis in mexican spanish tweets"}],"container-title":[],"original-title":[],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:50:45Z","timestamp":1741085445000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ssrn.com\/abstract=5091771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":100,"URL":"https:\/\/doi.org\/10.2139\/ssrn.5091771","relation":{},"subject":[],"published":{"date-parts":[[2025]]},"subtype":"preprint"}}