Academic literature on the topic 'Keylogger'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keylogger.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Keylogger"

1

S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.

Full text
Abstract:
Keystroke logging, often referred to as keylogger, keylogging or keyboard capturing, is the process of recording all the pressed keys on a keyboard autonomously so that the person who is using the keyboard is unaware that their actions on the computer are being monitored. In the world of cyber-crime, keylogger tool has been used mostly for malicious purposes such as stealing personal information and credit card details. However, for ethical purposes, keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents can use keylogger to monitor their child’s activity on the web. The log file is used to store the recorded keystrokes. However, current log files in keylogger are not encrypted, which can be easily hacked for malicious purposes. This paper proposes a new software based keylogger with log file encryption to increase the keylogging security towards Industrial Revolution 4.0.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Arjun, Pushpa Choudhary, Akhilesh kumar singh, and Dheerendra kumar tyagi. "Keylogger Detection and Prevention." Journal of Physics: Conference Series 2007, no. 1 (August 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2007/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guryanov, Konstantin V. "THE PROJECT "GUNMAN": FIRST KEYLOGGER." Basis, no. 2 (2020): 79–91. http://dx.doi.org/10.51962/2587-8042_2020_8_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K.S, Jayalekshmi. "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 635–39. http://dx.doi.org/10.26438/ijcse/v7i2.635639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aron, Jacob. "Touchscreen keylogger captures details from your taps." New Scientist 211, no. 2825 (August 2011): 21. http://dx.doi.org/10.1016/s0262-4079(11)61950-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jose, Bonia, Elizabeth Biju, Farsana A A, and Rijo M P. "WIRELESS HARDWARE KEYLOGGER USING ARDUINO LEONARDO AND NODEMCU." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 513–16. http://dx.doi.org/10.33564/ijeast.2020.v05i01.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (October 17, 2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dwivedi, Aarushi, Krishna Chandra Tripathi, and M. L. Sharma. "Advanced Keylogger- A Stealthy Malware for Computer Monitoring." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 6, 2021): 137–40. http://dx.doi.org/10.33130/ajct.2021v07i01.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vogelgesang, Stephanie, Stefan Hessel, and Frederik Möllers. "Hardware-Keylogger: Die Tastatur in der Hand des Feindes." Datenschutz und Datensicherheit - DuD 40, no. 11 (October 13, 2016): 729–34. http://dx.doi.org/10.1007/s11623-016-0692-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Keylogger"

1

Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.

Full text
Abstract:
This piece of work develops a solution that automates protection against software keystroke loggers. Keystroke loggers can be used illegally to register a user's keystrokes and in that way acquire sensitive information. The solution was tested on two different networks and the efficiency was measured. The network represents an enterprise network that uses the operating system Windows along with the directory service Active Directory. A script was developed to solve the automation matter. The script automatically executed the required programs that were needed to clean the network completely from keystroke loggers we had implemented and it took less than one minute to run.
Detta arbete utvecklar en lösning som automatiserar skydd mot mjukvarukeyloggers. Keystroke loggers kan användas illegalt för att registrera en användares knappnedtryckningar och på så vis komma över känslig information. Lösningen testkörs på två olika nätverk och effektiviteten mäts. Nätverket representerar ett företagsnätverk som använder operativsystemet Windows med katalogtjänsten Active Directory. Ett skript utvecklades för att lösa automatiseringsfrågan. Skriptet exekverade automatiskt de program som behövdes för att rensa nätverket helt från de keystroke loggers vi implementerat och det tog mindre än en minut att köra.
APA, Harvard, Vancouver, ISO, and other styles
2

Palm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.

Full text
Abstract:
I denna uppsats avser författaren att utvärdera om det är möjligt för en hemanvändare attskapa en trojan med ett program som genererar trojaner och med hjälp av andra gratisverktyg ta sig förbi antivirus-program. Samtidigt så kommer antivirus-program utvärderas angående hur dem lyckas skydda sig mot de skapade trojanerna och ge en överblick om hur skyddet är, både via uppladdning av trojaner till VirusTotal samt test av olika antivirusprogram. Den vetenskaplig forskning som gjorts tidigare som denna uppsats kommer vara snarlikgår att finna i [5]. Det forskas även om nya idéer för att upptäcka trojaner redan när dembörjar kommunicera[4] Uppsatsens resultat består av tre delar, resultat av uppladdning av trojaner viaVirusTotal, resultat av skanning med antivirus-program samt en kort analys omresultaten. I resultatet om VirusTotal så får en överblick om hur antivirus-programupptäcker Remote Access Trojaner(RAT) som blivit genererade i ett program.Dessa RATs görs även mer svårupptäckta av verktyg som går att få tag i gratis, cryptersför att kryptera trojanerna och binders för att binda trojaner ihop med en annan fil. Efterantivirus-skanningen redovisas resultat om hur ett antal utvalda antivirus-program klararav att skydda en PC mot RATs. I resultaten upptäcktes det att säkerheten är i vissa fallganska undermålig, men att det även finns antivirus-program som skyddar betydligtbättre än andra.
APA, Harvard, Vancouver, ISO, and other styles
3

Galiano, Alessandro. "Impersonificazione e sicurezza su rete." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8949/.

Full text
Abstract:
In questo lavoro di tesi, si è cercato di approfondire l’impersonificazione e ciò che ne consegue nel mondo del web nella sue versione dalla 1.0 alla 2.0. Si andranno ad analizzare i vari aspetti con l’aggiunta di informazioni riguardanti i vari attacchi che si possono subire utilizzando un terminale connesso ad internet e le modalità di difesa. Nello specifico verrà illustrato come funziona un noto programma per Microsoft Windows “Elite Keylogger”.
APA, Harvard, Vancouver, ISO, and other styles
4

Mallick, Saptarshi. "Physical Layer Detection of Hardware Keyloggers." DigitalCommons@USU, 2014. https://digitalcommons.usu.edu/etd/3962.

Full text
Abstract:
This work addresses the problem of detecting devices which are stealthily attached to the computer for logging keystrokes from keyboards. These devices are known as hardware keyloggers (HKL). When an HKL is attached to the keyboard, certain electrical characteristics of the keyboard signal are altered. Based on these characteristics (features), differences have been identified in an accurate assertion was made about the presence of HKL. The characteristics from which the differences were obtained were used to make distributions and compared with distance-measuring methods. An experiment was done to collect data from a number of keyboards and form two distributions (training and test) to perform the comparison. It was possible to detect the presence of HKL in the keyboard with a minimum of 4 to 100 keystrokes. For justifying the stability of the features, the temperature of the surroundings was obtained and the dependence of the features on temperature was obtained. Also, an experiment was done to see whether the keyboards were uniquely affected by the HKLs. This was done without using any training data, i.e., the distribution of features which was used did not come from a known state of the system (either with HKL or not with HKL).
APA, Harvard, Vancouver, ISO, and other styles
5

Puerini, Sara. "Typing your mind away. Comparing keylogged tasks with the Task Segment Framework." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22899/.

Full text
Abstract:
One of the main process features under study in Cognitive Translation & Interpreting Studies (CTIS) is the chronological unfolding of the tasks. The analyses of time spans in translation have been conceived in two ways: (1) studying those falling between text units of different sizes: words, phrases, sentences, and paragraphs; (2) setting arbitrary time span thresholds to explore where do they fall in the text, whether between text units or not. Writing disfluencies may lead to comprehensive insights into the cognitive activities involved in typing while translating. Indeed, long time spans are often taken as hints that cognitive resources have been subtracted from typing and devoted to other activities, such as planning, evaluating, etc. This exploratory, pilot study combined both approaches to seek potential general tendencies and contrasts in informants’ inferred mental processes when performing different writing tasks, through the analysis of their behaviors, as keylogged. The study tasks were retyping, monolingual free writing, translation, revision and a multimodal task—namely, monolingual text production based on an infographic leaflet. Task logs were chunked, and shorter time spans, including those within words, were analyzed following the Task Segment Framework (Muñoz & Apfelthaler, in press). Finally, time span analysis was combined with the analysis of the texts as to their lexical density, type-token ratio and word frequency. Several previous results were confirmed, and some others were surprising. Time spans in free writing were longer between paragraphs and sentences, possibly hinting at planning and, in translation, between clauses and words, suggesting more cognitive activities at these levels. On the other hand, the infographic was expected to facilitate the writing process, but most time spans were longer than in both free writing and translation. Results of the multimodal task and some other results suggest venues for further research.
APA, Harvard, Vancouver, ISO, and other styles
6

Corbelli, Sonia. "Reati informatici e sicurezza - come tutelarsi a livello tecnico e giuridico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
La tesi ha l’obiettivo di rendere consapevoli gli utenti sul fatto che esistono dei rischi per la sicurezza e devono prendere delle contromisure per proteggere i loro dati. Ciò è stabilito anche dalla legge, che presta particolare attenzione a questo problema quando vengono trattati dati sensibili. Attualmente si occupa di questa tutela il Codice Privacy, ma è già entrato in vigore il regolamento europeo 2016/679, che lo sostituirà operativamente il 25/05/2018. Come prima forma di sicurezza si introduce la crittografia, a chiave simmetrica o a chiave pubblica, applicata in particolare alla firma digitale. Questa può essere certificata da un’autorità di certificazione qualificata per avere la stessa validità di una firma autografa. Un’altra forma di sicurezza primaria fondamentale è il controllo degli accessi. Quello più comune è l’accesso tramite password. La principale fonte di minaccia è costituita dai malware. Se ne discutono quindi le tipologie e i modi in cui compromettono un sistema e si illustrano alcune forme di difesa per proteggersi da essi. Si considerano quindi gli attaccanti che si introducono in un sistema informatico, mettendone in evidenza le motivazioni e illustrando ulteriori misure di protezione tecniche. Si ricorda infine che tutti questi comportamenti malevoli sono reati e si illustrano le leggi che li regolano, in modo da tutelare gli utenti legittimi e punire i criminali.
APA, Harvard, Vancouver, ISO, and other styles
7

Hung, Chien-wei, and 洪健惟. "KKBB: Kernel Keylogger Bye-Bye." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/31036288763818979315.

Full text
Abstract:
碩士
國立中央大學
資訊工程研究所
99
Keystroke logging is one of the most widespread threats used for password theft in the world. In this paper, rather than detecting existing malwares or creating a trusted tunnel in the kernel, we present both QTE and Broker methods to safely input passwords in web browsers according to different scenarios. To fit real circumstances, we assume users have limited privileges on the untrusted public computers and they don’t want their passwords being eavesdropped; therefore, a user-space solution is proposed firstly as QTE method.   The QTE method utilizes a canvas to cue users whether their input will be remembered or ignored by our add-on, which provides a chance for users to obfuscate keyloggers by tapping keyboards haphazardly. Despite QTE method is immune to most kernel, hypervisor, hardware, and second-channel keyloggers, it may be ineffective if screen recording is taken by attackers. To eliminate password leakage, the Broker method uses a second device and a Broker server to safely transfer information for users. In contract with previous works, our design successfully separates username and password so that even the second devices and the Broker servers are compromised, users won’t lose their private data to attackers. Furthermore, both methods we proposed can be applied to all websites without their support or users’ settings beforehand.
APA, Harvard, Vancouver, ISO, and other styles
8

HSUEH, YU-SHENG, and 薛宇盛. "The Design and Implementation of Anti Keylogger." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/61083912654011461790.

Full text
Abstract:
碩士
東吳大學
資訊管理學系
98
Currently, major web-based services such as Facebook, Gmail, and e-Bay, verify users’ identities through logging into the username and password. Once there exists the keylogger in the logging computer, the risk of identity theft is very high. Many users will use the same pair of username and password to access different websites. If the username and password are stolen, the other Internet identities are also stolen. This thesis aims to propose and implement the anti keylogger mechanism using API Hooking techniques to detect the keylogger. The proposed mechanism can prevent the keylogger from keyboard logging, screen capturing and asterisk password removal.
APA, Harvard, Vancouver, ISO, and other styles
9

Güven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.

Full text
Abstract:
Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. A ransomware named CryptoLocker has caused many individuals, hospitals, and institutions thousands if not millions of dollars in damage due to encrypting the computer files thus demanding a ransom in return. Once the ransomware strikes a system, the recoverability is almost non-existent if no backup or system restore is present due to the private key which was used to encrypt files is encrypted and sent to the attacker’s database. Without the key, there is no recovery for restoring files. Objective: Exploratory research is conducted to reveal unique methods ransomware and keylogger may use to strike a system. The goal is to disclose protection policies of the Windows systems for the security enthusiasts and computer users. Three main objectives are present; how viruses hide in a system without servicing any rootkits to hide the malware, how ransomware and keylogger can be used together to deliver damage, and how to covert CPU usage of the ransomware during the encryption routine. Method: To answer the questions and exploit new features, ransomware, keylogger and a trojan horse is built. Original CryptoLocker architecture has been analyzed, and some methods have been derived. The final application is running on the Windows operating system; Windows 10. Win32 API, C++, and C# are used for the construction of the malware programs. Visual Studio 2017 has been used as an IDE. Results: The testing results reveal that running encryption routine as a background thread covert the CPU usage except the operation time increases by five times. The experiments show that disguising a malware program among the task manager process list is possible by setting Win32 API flag within the execution of the program. Changing the malware name, signature, and description of the program further enhance the sustainability rate from the everyday users.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Keylogger"

1

Зайцев, О. В. Rootkits, SpyWare/Adware, Keyloggers & Backdoors: обнаружение и защита. Санкт-Петербург: БХВ-Петербург, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kraft, Peter B. Network Hacking: Professionelle Angriffs- und Verteidigungstechniken gegen Hacker und Datendiebe ; [Tools fu r Angriff und Verteidigung - vom Keylogger bis zum Rootkit ; Vorbeugung gegen Malware-Attacken aus dem Internet ; effektive Schutzmassnahmen fu r Privat- und Firmennetze]. 2nd ed. Poing: Franzis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zaytsev, Oleg. Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization. A-List Publishing, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Keylogger"

1

Simms, Seth, Margot Maxwell, Sara Johnson, and Julian Rrushi. "Keylogger Detection Using a Decoy Keyboard." In Data and Applications Security and Privacy XXXI, 433–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Royo, Álvaro Arribas, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, and Theofilos Toulkeridis. "Malware Security Evasion Techniques: An Original Keylogger Implementation." In Advances in Intelligent Systems and Computing, 375–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72657-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rahaman, Naziour, Salauddin Rubel, and Ahmed Al Marouf. "Keylogger Threat to the Android Mobile Banking Applications." In Computer Networks and Inventive Communication Technologies, 163–74. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wazid, Mohammad, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, and Asit Tyagi. "Implementation and Embellishment of Prevention of Keylogger Spyware Attacks." In Communications in Computer and Information Science, 262–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40576-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kozierkiewicz-Hetmańska, Adrianna, Aleksander Marciniak, and Marcin Pietranik. "User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks." In Computational Collective Intelligence, 345–55. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45243-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sbai, Hugo, Michael Goldsmith, Samy Meftali, and Jassim Happa. "A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them." In Cyberspace Safety and Security, 18–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tuscano, Ashley, and Thomas Shane Koshy. "Types of Keyloggers Technologies – Survey." In Lecture Notes in Electrical Engineering, 11–22. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7961-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gerdes, Ryan M., and Saptarshi Mallick. "Physical-Layer Detection of Hardware Keyloggers." In Research in Attacks, Intrusions, and Defenses, 26–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiménez Aranda, Itzael, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, and Ponciano Jorge Escamilla Ambrosio. "Possible Keyloggers Without Implementing a Keyboard in Android." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 104–12. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78816-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ortolani, Stefano, Cristiano Giuffrida, and Bruno Crispo. "Bait Your Hook: A Novel Detection Technique for Keyloggers." In Lecture Notes in Computer Science, 198–217. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15512-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Keylogger"

1

Ali, Tasabeeh O. M., Omer S. A. Awadelseed, and Abeer E. W. Eldewahi. "Random multiple layouts: Keylogger prevention technique." In 2016 Conference of Basic Sciences and Engineering Studies (SGCAC). IEEE, 2016. http://dx.doi.org/10.1109/sgcac.2016.7457997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gunalakshmii, S., and P. Ezhumalai. "Mobile keylogger detection using machine learning technique." In 2014 International Conference on Computer Communication & Systems (ICCCS). IEEE, 2014. http://dx.doi.org/10.1109/icccs.2014.7068167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wajahat, Ahsan, Azhar Imran, Jahanzaib Latif, Ahsan Nazir, and Anas Bilal. "A Novel Approach of Unprivileged Keylogger Detection." In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2019. http://dx.doi.org/10.1109/icomet.2019.8673404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huseynov, Huseyn, Kenichi Kourai, Tarek Saadawi, and Obinna Igbe. "Virtual Machine Introspection for Anomaly-Based Keylogger Detection." In 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). IEEE, 2020. http://dx.doi.org/10.1109/hpsr48589.2020.9098980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wazid, Mohammad, Avita Katal, R. H. Goudar, D. P. Singh, Asit Tyagi, Robin Sharma, and Priyanka Bhakuni. "A framework for detection and prevention of novel keylogger spyware attacks." In 2013 7th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2013. http://dx.doi.org/10.1109/isco.2013.6481194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cho, Junsung, Geumhwan Cho, and Hyoungshick Kim. "Keyboard or keylogger?: A security analysis of third-party keyboards on Android." In 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2015. http://dx.doi.org/10.1109/pst.2015.7232970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuncoro, Adam Prayogo, and Bagus Adhi Kusuma. "Keylogger Is A Hacking Technique That Allows Threatening Information On Mobile Banking User." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8721028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nasution, Surya Michrandi, Yudha Purwanto, Agus Virgono, and Girindra Chandra Alam. "Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board." In 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA). IEEE, 2014. http://dx.doi.org/10.1109/tssa.2014.7065954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Widyasari, Permata Ayu. "Ethical Dilemma Decision Making Based on Personality: The Case of Installation of a Keylogger System." In 18th International Symposium on Management (INSYMA 2021). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/aebmr.k.210628.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmadzadegan, M. Hossein, Ali-asghar Khorshidvand, and Mehrdad Pezeshki. "A method for securing username and password against the Keylogger software using the logistic map chaos function." In 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI). IEEE, 2015. http://dx.doi.org/10.1109/kbei.2015.7436194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography