Academic literature on the topic 'Keylogger'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Keylogger.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Keylogger"
S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.
Full textSingh, Arjun, Pushpa Choudhary, Akhilesh kumar singh, and Dheerendra kumar tyagi. "Keylogger Detection and Prevention." Journal of Physics: Conference Series 2007, no. 1 (2021): 012005. http://dx.doi.org/10.1088/1742-6596/2007/1/012005.
Full textYadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.
Full textGuryanov, Konstantin V. "THE PROJECT "GUNMAN": FIRST KEYLOGGER." Basis, no. 2 (2020): 79–91. http://dx.doi.org/10.51962/2587-8042_2020_8_79.
Full textK.S, Jayalekshmi. "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7, no. 2 (2019): 635–39. http://dx.doi.org/10.26438/ijcse/v7i2.635639.
Full textAron, Jacob. "Touchscreen keylogger captures details from your taps." New Scientist 211, no. 2825 (2011): 21. http://dx.doi.org/10.1016/s0262-4079(11)61950-7.
Full textJose, Bonia, Elizabeth Biju, Farsana A A, and Rijo M P. "WIRELESS HARDWARE KEYLOGGER USING ARDUINO LEONARDO AND NODEMCU." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (2020): 513–16. http://dx.doi.org/10.33564/ijeast.2020.v05i01.091.
Full textBayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.
Full textDwivedi, Aarushi, Krishna Chandra Tripathi, and M. L. Sharma. "Advanced Keylogger- A Stealthy Malware for Computer Monitoring." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (2021): 137–40. http://dx.doi.org/10.33130/ajct.2021v07i01.028.
Full textVogelgesang, Stephanie, Stefan Hessel, and Frederik Möllers. "Hardware-Keylogger: Die Tastatur in der Hand des Feindes." Datenschutz und Datensicherheit - DuD 40, no. 11 (2016): 729–34. http://dx.doi.org/10.1007/s11623-016-0692-9.
Full textDissertations / Theses on the topic "Keylogger"
Karlsson, Tobias, and Andreas Pettersson. "Software keystroke logging : Automatisering av skydd mot software keystroke logging." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19618.
Full textPalm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.
Full textGaliano, Alessandro. "Impersonificazione e sicurezza su rete." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8949/.
Full textMallick, Saptarshi. "Physical Layer Detection of Hardware Keyloggers." DigitalCommons@USU, 2014. https://digitalcommons.usu.edu/etd/3962.
Full textPuerini, Sara. "Typing your mind away. Comparing keylogged tasks with the Task Segment Framework." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22899/.
Full textCorbelli, Sonia. "Reati informatici e sicurezza - come tutelarsi a livello tecnico e giuridico." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textHung, Chien-wei, and 洪健惟. "KKBB: Kernel Keylogger Bye-Bye." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/31036288763818979315.
Full textHSUEH, YU-SHENG, and 薛宇盛. "The Design and Implementation of Anti Keylogger." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/61083912654011461790.
Full textGüven, Volkan. "Patterns of malware and digital attacks : A guideline for the security enthusiast." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16313.
Full textBooks on the topic "Keylogger"
Зайцев, О. В. Rootkits, SpyWare/Adware, Keyloggers & Backdoors: обнаружение и защита. БХВ-Петербург, 2006.
Find full textKraft, Peter B. Network Hacking: Professionelle Angriffs- und Verteidigungstechniken gegen Hacker und Datendiebe ; [Tools fu r Angriff und Verteidigung - vom Keylogger bis zum Rootkit ; Vorbeugung gegen Malware-Attacken aus dem Internet ; effektive Schutzmassnahmen fu r Privat- und Firmennetze]. 2nd ed. Franzis, 2010.
Find full textZaytsev, Oleg. Rootkits, Spyware/Adware, Keyloggers and Backdoors: Detection and Neutralization. A-List Publishing, 2006.
Find full textBook chapters on the topic "Keylogger"
Simms, Seth, Margot Maxwell, Sara Johnson, and Julian Rrushi. "Keylogger Detection Using a Decoy Keyboard." In Data and Applications Security and Privacy XXXI. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61176-1_24.
Full textRoyo, Álvaro Arribas, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, and Theofilos Toulkeridis. "Malware Security Evasion Techniques: An Original Keylogger Implementation." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72657-7_36.
Full textRahaman, Naziour, Salauddin Rubel, and Ahmed Al Marouf. "Keylogger Threat to the Android Mobile Banking Applications." In Computer Networks and Inventive Communication Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_12.
Full textWazid, Mohammad, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, and Asit Tyagi. "Implementation and Embellishment of Prevention of Keylogger Spyware Attacks." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40576-1_26.
Full textKozierkiewicz-Hetmańska, Adrianna, Aleksander Marciniak, and Marcin Pietranik. "User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks." In Computational Collective Intelligence. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45243-2_32.
Full textSbai, Hugo, Michael Goldsmith, Samy Meftali, and Jassim Happa. "A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them." In Cyberspace Safety and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01689-0_2.
Full textTuscano, Ashley, and Thomas Shane Koshy. "Types of Keyloggers Technologies – Survey." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7961-5_2.
Full textGerdes, Ryan M., and Saptarshi Mallick. "Physical-Layer Detection of Hardware Keyloggers." In Research in Attacks, Intrusions, and Defenses. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_2.
Full textJiménez Aranda, Itzael, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, and Ponciano Jorge Escamilla Ambrosio. "Possible Keyloggers Without Implementing a Keyboard in Android." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78816-6_8.
Full textOrtolani, Stefano, Cristiano Giuffrida, and Bruno Crispo. "Bait Your Hook: A Novel Detection Technique for Keyloggers." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15512-3_11.
Full textConference papers on the topic "Keylogger"
Ali, Tasabeeh O. M., Omer S. A. Awadelseed, and Abeer E. W. Eldewahi. "Random multiple layouts: Keylogger prevention technique." In 2016 Conference of Basic Sciences and Engineering Studies (SGCAC). IEEE, 2016. http://dx.doi.org/10.1109/sgcac.2016.7457997.
Full textGunalakshmii, S., and P. Ezhumalai. "Mobile keylogger detection using machine learning technique." In 2014 International Conference on Computer Communication & Systems (ICCCS). IEEE, 2014. http://dx.doi.org/10.1109/icccs.2014.7068167.
Full textWajahat, Ahsan, Azhar Imran, Jahanzaib Latif, Ahsan Nazir, and Anas Bilal. "A Novel Approach of Unprivileged Keylogger Detection." In 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). IEEE, 2019. http://dx.doi.org/10.1109/icomet.2019.8673404.
Full textHuseynov, Huseyn, Kenichi Kourai, Tarek Saadawi, and Obinna Igbe. "Virtual Machine Introspection for Anomaly-Based Keylogger Detection." In 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). IEEE, 2020. http://dx.doi.org/10.1109/hpsr48589.2020.9098980.
Full textWazid, Mohammad, Avita Katal, R. H. Goudar, et al. "A framework for detection and prevention of novel keylogger spyware attacks." In 2013 7th International Conference on Intelligent Systems and Control (ISCO). IEEE, 2013. http://dx.doi.org/10.1109/isco.2013.6481194.
Full textCho, Junsung, Geumhwan Cho, and Hyoungshick Kim. "Keyboard or keylogger?: A security analysis of third-party keyboards on Android." In 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2015. http://dx.doi.org/10.1109/pst.2015.7232970.
Full textKuncoro, Adam Prayogo, and Bagus Adhi Kusuma. "Keylogger Is A Hacking Technique That Allows Threatening Information On Mobile Banking User." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8721028.
Full textNasution, Surya Michrandi, Yudha Purwanto, Agus Virgono, and Girindra Chandra Alam. "Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board." In 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA). IEEE, 2014. http://dx.doi.org/10.1109/tssa.2014.7065954.
Full textWidyasari, Permata Ayu. "Ethical Dilemma Decision Making Based on Personality: The Case of Installation of a Keylogger System." In 18th International Symposium on Management (INSYMA 2021). Atlantis Press, 2021. http://dx.doi.org/10.2991/aebmr.k.210628.042.
Full textAhmadzadegan, M. Hossein, Ali-asghar Khorshidvand, and Mehrdad Pezeshki. "A method for securing username and password against the Keylogger software using the logistic map chaos function." In 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI). IEEE, 2015. http://dx.doi.org/10.1109/kbei.2015.7436194.
Full text