To see the other types of publications on this topic, follow the link: Keylogger.

Journal articles on the topic 'Keylogger'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 journal articles for your research on the topic 'Keylogger.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.

Full text
Abstract:
Keystroke logging, often referred to as keylogger, keylogging or keyboard capturing, is the process of recording all the pressed keys on a keyboard autonomously so that the person who is using the keyboard is unaware that their actions on the computer are being monitored. In the world of cyber-crime, keylogger tool has been used mostly for malicious purposes such as stealing personal information and credit card details. However, for ethical purposes, keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents can use keylogger to monitor their child’s activity on the web. The log file is used to store the recorded keystrokes. However, current log files in keylogger are not encrypted, which can be easily hacked for malicious purposes. This paper proposes a new software based keylogger with log file encryption to increase the keylogging security towards Industrial Revolution 4.0.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Arjun, Pushpa Choudhary, Akhilesh kumar singh, and Dheerendra kumar tyagi. "Keylogger Detection and Prevention." Journal of Physics: Conference Series 2007, no. 1 (August 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2007/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guryanov, Konstantin V. "THE PROJECT "GUNMAN": FIRST KEYLOGGER." Basis, no. 2 (2020): 79–91. http://dx.doi.org/10.51962/2587-8042_2020_8_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

K.S, Jayalekshmi. "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 635–39. http://dx.doi.org/10.26438/ijcse/v7i2.635639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aron, Jacob. "Touchscreen keylogger captures details from your taps." New Scientist 211, no. 2825 (August 2011): 21. http://dx.doi.org/10.1016/s0262-4079(11)61950-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jose, Bonia, Elizabeth Biju, Farsana A A, and Rijo M P. "WIRELESS HARDWARE KEYLOGGER USING ARDUINO LEONARDO AND NODEMCU." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 513–16. http://dx.doi.org/10.33564/ijeast.2020.v05i01.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (October 17, 2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dwivedi, Aarushi, Krishna Chandra Tripathi, and M. L. Sharma. "Advanced Keylogger- A Stealthy Malware for Computer Monitoring." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 6, 2021): 137–40. http://dx.doi.org/10.33130/ajct.2021v07i01.028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vogelgesang, Stephanie, Stefan Hessel, and Frederik Möllers. "Hardware-Keylogger: Die Tastatur in der Hand des Feindes." Datenschutz und Datensicherheit - DuD 40, no. 11 (October 13, 2016): 729–34. http://dx.doi.org/10.1007/s11623-016-0692-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Barankova, I., U. V. Mikhailova, and G. I. Lukyanov. "DEVELOPMENT OF SOFTWARE AND HARDWARE MEANS OF IDENTIFICATION OF HIDDEN USB-KEYLOGGER DEVICES." Dynamics of Systems, Mechanisms and Machines 7, no. 4 (2019): 066–71. http://dx.doi.org/10.25206/2310-9793-7-4-66-71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Guntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (May 30, 2018): 12–21. http://dx.doi.org/10.31849/digitalzone.v9i1.648.

Full text
Abstract:
Aplikasi single sign-on (SSO) adalah sebuah sistem otentikasi login yang mengizinkan bagi seorang pengguna dapat mengakses banyak sistem hanya dengan satu akun aja. Dengan sistem single sign-on (SSO) tersebut, seorang user sistem aplikasi hanya cukup melakukan otentikasi sekali saja untuk masuk ke semua layanan yang terdapat pada dalam sistem aplikasi. Otentikasi login berbasis teks pada sistem single sign-on (SSO) yang sudah ada saat ini, mempunyai kelemahan, salah satunya adalah pencurian password dengan aplikasi keylogger. Perancangan aplikasi sistem single sign-on (SSO) yang dikembangkan dengan mencoba menambahkan otentikasi menggunakan gambar. Gambar yang digunakan telah diberikan sebuah keamanan yaitu menggunakan teknik steganografi dengan metode Least Significant Bit. Abstract Single sign-on (SSO) application is a login authentication system that allows a user to access multiple systems with just one account. With a single sign-on (SSO) system, an application system user only just authenticates once to log in to all services contained in the application system. Text-based login authentication on existing single sign-on (SSO) systems, has a weakness, one of which is password theft with keylogger apps. The design of single sign-on (SSO) system applications developed by trying to add authentication using images. The image used has been given a security that is using steganography technique with a method of the Least Significant Bit. .
APA, Harvard, Vancouver, ISO, and other styles
13

Guntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (May 30, 2018): 12–21. http://dx.doi.org/10.31849/dz.v9i1.648.

Full text
Abstract:
Aplikasi single sign-on (SSO) adalah sebuah sistem otentikasi login yang mengizinkan bagi seorang pengguna dapat mengakses banyak sistem hanya dengan satu akun aja. Dengan sistem single sign-on (SSO) tersebut, seorang user sistem aplikasi hanya cukup melakukan otentikasi sekali saja untuk masuk ke semua layanan yang terdapat pada dalam sistem aplikasi. Otentikasi login berbasis teks pada sistem single sign-on (SSO) yang sudah ada saat ini, mempunyai kelemahan, salah satunya adalah pencurian password dengan aplikasi keylogger. Perancangan aplikasi sistem single sign-on (SSO) yang dikembangkan dengan mencoba menambahkan otentikasi menggunakan gambar. Gambar yang digunakan telah diberikan sebuah keamanan yaitu menggunakan teknik steganografi dengan metode Least Significant Bit. Abstract Single sign-on (SSO) application is a login authentication system that allows a user to access multiple systems with just one account. With a single sign-on (SSO) system, an application system user only just authenticates once to log in to all services contained in the application system. Text-based login authentication on existing single sign-on (SSO) systems, has a weakness, one of which is password theft with keylogger apps. The design of single sign-on (SSO) system applications developed by trying to add authentication using images. The image used has been given a security that is using steganography technique with a method of the Least Significant Bit. .
APA, Harvard, Vancouver, ISO, and other styles
14

Barankova, I. I., U. V. Mikhailova, and G. I. Lukyanov. "Software development and hardware means of hidden usb-keylogger devices identification." Journal of Physics: Conference Series 1441 (January 2020): 012032. http://dx.doi.org/10.1088/1742-6596/1441/1/012032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rahim, Robbi, Heri Nurdiyanto, Ansari Saleh A, Dahlan Abdullah, Dedy Hartama, and Darmawan Napitupulu. "Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm." Journal of Physics: Conference Series 954 (January 2018): 012008. http://dx.doi.org/10.1088/1742-6596/954/1/012008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hilmi, Muhammad Anis Al, A. Sumarudin, and Willy Permana Putra. "ONE-TIME-PASSWORD (OTP) DENGAN MODIFIKASI VIGENERE CHIPER DAN PERANGKAT USB BERBASIS MICROCONTROLLER, SENSOR FINGERPRINT, DAN REAL TIME CLOCK (RTC) UNTUK AUTENTIKASI PENGGUNA PADA AKSES APLIKASI WEB." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 6–11. http://dx.doi.org/10.14421/csecurity.2020.3.2.2082.

Full text
Abstract:
Hampir semua aplikasi web yang memerlukan pengesahan / autentikasi, menggunakan mekanisme verifikasi password untuk masuk ke dalam sistem. Bagi pengguna, password adalah dilema. Password yang aman seringkali sulit untuk diingat, sedangkan password yang mudah diingat biasanya mudah untuk ditebak. Pengguna juga melakukan hal teledor seperti menulis password di sticky note dan semacamnya, juga menggunakan password yang sama untuk akun berbeda sehingga membuat keamanan akun semakin rentan, terutama karena serangan dengan keylogger. Untuk mengatasi hal ini, telah dikembangkan beberapa teknik pengamanan, seperti menambah faktor lain ketika login dengan kode One-Time-Password (OTP) lewat SMS, perangkat token generator seperti yang dipakai perbankan, login dengan hardware USB, akses lewat sensor biometrik fingerprint, bahkan electrocardiogram (ECG). Dengan menilik kelebihan dan kekurangan aneka pendekatan yang telah dikembangkan serta dengan orientasi fokus kepada kemudahanan pengguna, penelitian ini mengusulkan perangkat dan metode untuk memperkuat keamanan sistem dalam proses login, dan tetap mudah dalam penggunaannya (tanpa secara manual mengingat, memasukkan username dan password), portabel, dan terjangkau. Pada makalah ini autentikasi dengan OTP diajukan dengan metode Vigenere chiper yang dimodifikasi dengan nilai salt yang selalu berubah dan pengacakan data menggunakan algoritma butterfly. Ditambah pengamanan menggunakan perangkat keras berbasis microcontroller, sensor fingerprint, dan modul Real-Time-Clock (RTC) untuk validasi kepemilikan dan sinkronisasi waktu dalam mencegah keylogger attack. Hasil pengujian memperlihatkan perangkat dapat menghasilkan OTP dengan waktu rata-rata 0,956 sekon, dan memudahkan pengguna untuk login ke aplikasi web tanpa perlu mengingat password.
APA, Harvard, Vancouver, ISO, and other styles
17

Schreiner, Paul. "2018/5 Evidence from long-term keylogger surveillance cannot be used in a dismissal lawsuit (GE)." European Employment Law Cases 3, no. 1 (May 2018): 28–31. http://dx.doi.org/10.5553/eelc/187791072018003001006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Araghian, Roya, Behzad Ghonsooly, and Afsaneh Ghanizadeh. "Investigating problem-solving strategies of translation trainees with high and low levels of self-efficacy." Translation, Cognition & Behavior 1, no. 1 (March 2, 2018): 74–97. http://dx.doi.org/10.1075/tcb.00004.ara.

Full text
Abstract:
Abstract Translatology adopts psychological and cognitive approaches to study the complex processes underlying translational phenomena. As such, it deals with both translations and the translators who produce them. The present study uses think-aloud protocols and keystroke logging to explore the impact of affective factors such as self-efficacy beliefs on the selection and application of translation problem-solving strategies by a group of trainee translators completing a translation task. Four translation trainees completed a Translation Self-efficacy Questionnaire. Participants with both high and low self-efficacy rankings were asked to translate a text using the Translog keylogger while simultaneously verbalizing their mental processes. Analysis of the verbal protocols indicated considerable differences within the group regarding the cognitive and metacognitive strategies that they chose to employ. The results suggested that low self-efficacy leads subjects to spend too much time translating, due to repeated attempts at production and extensive revision. Implications of the findings for translator training are discussed.
APA, Harvard, Vancouver, ISO, and other styles
19

Nugraha, Julian Dwi, Avon Budiono, and Ahmad Almaarif. "Analisis Malware Berdasarkan API Call Memory Dengan Metode Deteksi Signature-Based." Jurnal Rekayasa Sistem & Industri (JRSI) 6, no. 02 (December 20, 2019): 77. http://dx.doi.org/10.25124/jrsi.v6i02.351.

Full text
Abstract:
Malware merupakan sebuah perangkat lunak atau program komputer yang digunakan untuk melakukan tindakan kejahatan. Malware pada dasarnya dirancang untuk menginfeksi sistem komputer penguna tanpa persetujuan pemiliknya. Trojan, Worms, Virus, Spyware, dan Keylogger adalah kategori malware yang dapat merugikan pengguna yang telah terinfeksi. Berdasarkan hal tersebut maka dari itu diperlukan analisis malware menggunakan API call memory dengan metode signature-based detection. Signature based detection adalah teknik deteksi yang berdasarkan pattern matching, string, mask, atau teknik fingerprinting. Signature adalah teknik persamaan bit yang disuntikkan dalam program aplikasi oleh attacker, yang secara unik mengidentifikasi jenis malware tertentu. Hal ini digunakan dengan tujuan untuk mengidentifikasi malware tersebut menggandung program yang dapat mengambil data pengguna tanpa sepengetahuan pengguna itu sendiri. Maka dari itu di dalam penelitian ini dilakukan analisis malware menggunakan sebanyak 30 malware untuk melihat jenis API call yang digunakan oleh malware tersebut. Pada penelitian ini berfokus untuk melakukan analisis pada API Memory yang telah didapatkan. Dari semua malware menjalankan satu API memory yang sama ketika dijalankan pertama kali. Hasil pada penelitian ini melihat API call memory dan hasil signature yang telah dilakukan menggunakan metode signature based detection dan melihat keterkaitan antara API call memory dengan hasil signature pada setiap malware.
APA, Harvard, Vancouver, ISO, and other styles
20

Jiménez-Crespo, Miguel A., and Joseph V. Casillas. "Literal is not always easier." Translation, Cognition & Behavior 4, no. 1 (June 7, 2021): 98–123. http://dx.doi.org/10.1075/tcb.00048.jim.

Full text
Abstract:
Abstract “Literal translation” is a popular construct in Translation Studies. Research from computational approaches has consistently shown that non-literal translations, i.e., renderings semantically and syntactically different or not close to the source text, are more difficult or effortful to produce than literal ones. This paper researches whether literal translations are systematically less effortful to process than non-literal ones using comparable corpus data. The effort incurred in processing literal translations from a parallel corpus is compared to that of processing the most frequent non-literal renderings found in previous comparable corpus studies. Ten professional translators edited a text using a mock translation environment setup using the keylogger Inputlog. The task was presented as a regular editing process with a full cohesive text presented segment pair by segment pair. Time served as a proxy for overall cognitive effort. We analyzed time from presentation to type (TTP) and time to completion of segment edit (TC), or complete editing events. Results showed that processing efforts are indistinguishable between categories, suggesting that cognitive effort to edit non-literal default translation candidates is not always higher when compared to the most frequent literal translations from a parallel corpus.
APA, Harvard, Vancouver, ISO, and other styles
21

Sagiroglu, Seref, and Gurol Canbek. "Keyloggers." IEEE Technology and Society Magazine 28, no. 3 (2009): 10–17. http://dx.doi.org/10.1109/mts.2009.934159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chahrvin, Sacha. "Keyloggers – your security nightmare?" Computer Fraud & Security 2007, no. 7 (July 2007): 10–11. http://dx.doi.org/10.1016/s1361-3723(07)70090-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Prajapati, Viraj. "Analysis of Keyloggers in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 8, no. 10 (October 31, 2020): 466–74. http://dx.doi.org/10.22214/ijraset.2020.31925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bhardwaj, Akashdeep, and Sam Goundar. "Keyloggers: silent cyber security weapons." Network Security 2020, no. 2 (February 2020): 14–19. http://dx.doi.org/10.1016/s1353-4858(20)30021-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Heron, Simon. "The rise and rise of the keyloggers." Network Security 2007, no. 6 (June 2007): 4–6. http://dx.doi.org/10.1016/s1353-4858(07)70052-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Zaitsev, Oleg. "Skeleton keys: the purpose and applications of keyloggers." Network Security 2010, no. 10 (October 2010): 12–17. http://dx.doi.org/10.1016/s1353-4858(10)70126-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ortolani, Stefano, Cristiano Giuffrida, and Bruno Crispo. "Unprivileged Black-Box Detection of User-Space Keyloggers." IEEE Transactions on Dependable and Secure Computing 10, no. 1 (January 2013): 40–52. http://dx.doi.org/10.1109/tdsc.2012.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Waterson, Dave. "How Keyloggers Work and How To Defeat Them." ITNOW 63, no. 1 (February 16, 2021): 40–41. http://dx.doi.org/10.1093/itnow/bwab017.

Full text
Abstract:
Abstract Homeworking policies, necessary to curtail COVID-19, have also had the effect of exposing smaller enterprises to a level of sophisticated cyber-attack ordinarily reserved for large multi-nationals, writes Dave Waterson, CEO of SentryBay.
APA, Harvard, Vancouver, ISO, and other styles
29

Creutzburg, Reiner. "The strange world of keyloggers - an overview, Part I." Electronic Imaging 2017, no. 6 (January 29, 2017): 139–48. http://dx.doi.org/10.2352/issn.2470-1173.2017.6.mobmu-313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sreenivas, R. Sreeram, and R. Anitha. "Detecting keyloggers based on traffic analysis with periodic behaviour." Network Security 2011, no. 7 (July 2011): 14–19. http://dx.doi.org/10.1016/s1353-4858(11)70076-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Adhikary, Nairit, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, and Vrijendra Singh. "Battering Keyloggers and Screen Recording Software by Fabricating Passwords." International Journal of Computer Network and Information Security 4, no. 5 (June 1, 2012): 13–21. http://dx.doi.org/10.5815/ijcnis.2012.05.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Pillai, Divyadev, and Irfan Siddavatam. "A modified framework to detect keyloggers using machine learning algorithm." International Journal of Information Technology 11, no. 4 (September 3, 2018): 707–12. http://dx.doi.org/10.1007/s41870-018-0237-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Damopoulos, D., G. Kambourakis, and S. Gritzalis. "From keyloggers to touchloggers: Take the rough with the smooth." Computers & Security 32 (February 2013): 102–14. http://dx.doi.org/10.1016/j.cose.2012.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hung, Chien Wei, Fu Hau Hsu, Shih Jen Chen, Yan Ling Hwang, Chang Kuo Tso, and Li Pin Hsu. "Defend a System against Keyloggers with a Privilege-Limited Account." Applied Mechanics and Materials 284-287 (January 2013): 3385–89. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3385.

Full text
Abstract:
Nowadays keystroke logging is one of the most widespread threats used for password theft. In this paper, rather than detecting existing malware or creating a trusted tunnel in the kernel, we present a method called Broker to protect the password that a user provides for a web page to login to a web service. Installing such solutions in a host only requires limited privileges of related computers. The Broker method uses a second device and the Broker server to safely transfer users’ account-related information. Comparing with previous work, the Broker method successfully separates user names and passwords so that even a second device and the Broker server are compromised, users still will not leak their private information to attackers. Finally, the Broker method can be applied to all websites without any modification of them.
APA, Harvard, Vancouver, ISO, and other styles
35

Fougner Rydning, Atin. "The Return of Sense on the Scene of Translation Studies in the Light of the Cognitive Blending Theory." Meta 50, no. 2 (July 20, 2005): 392–404. http://dx.doi.org/10.7202/010989ar.

Full text
Abstract:
Abstract The aim of this paper is to revitalize the Paris school model of deverbalization and reverbalization of sense in translation, i.e. the representation of sense as a mental image, in light of the cognitive blending theory. Through sample examples of online process data taken from the concurrent think-aloud protocols of two experienced professional translators and the keylogged files on their writing processes, I will give evidence of the imaginative and creative work pertaining to their construals of sense, before showing that the blending theory model represents sense as the result of mapping concepts into other concepts and as relations between mental spaces.
APA, Harvard, Vancouver, ISO, and other styles
36

., Prathamesh Bhosale. "KEYLOGG - A TOUCH BASED KEY LOGGING APPLICATION." International Journal of Research in Engineering and Technology 05, no. 04 (April 25, 2016): 12–15. http://dx.doi.org/10.15623/ijret.2016.0504003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Sri Ram Varma, D., K. Meghana, V. Sai Deepak, and R. Murugan. "Graphical password scheme to diminish shoulder surfing." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 234. http://dx.doi.org/10.14419/ijet.v7i1.1.9474.

Full text
Abstract:
Many authentication schemes are known to us but none of them are completely secure. Textual password is the most common technique used by majority of the people in the industry. But Textual passwords are vulnerable to dictionary attacks, keyloggers, brute-force attacks, even guessing may work out sometimes. Alternative authentication schemes have been proposed to overcome this problem, some of them are Biometric authentication, retina based authentication, graphical password scheme ETC., Authentication Schemes such as biometric and retina scans are too costly, so they are not always preferred. Not every graphical authentication is secure and efficient. In this paper, an authentication scheme with a combination of text and colour is proposed. This allows the user to log-in to the framework a little more secure.
APA, Harvard, Vancouver, ISO, and other styles
38

Fu, Shen, Mathew L. Wymore, Ting-Wei Chang, and Daji Qiao. "A Novel Software System Protection Scheme Based on Behavior and Context Monitoring." International Journal of Systems and Software Security and Protection 10, no. 1 (January 2019): 22–46. http://dx.doi.org/10.4018/ijsssp.2019010102.

Full text
Abstract:
The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.
APA, Harvard, Vancouver, ISO, and other styles
39

Hussain, Muzammil, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, and Mohamed Abdulnabi. "The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks." Pervasive and Mobile Computing 25 (January 2016): 1–25. http://dx.doi.org/10.1016/j.pmcj.2015.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Al-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (October 10, 2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.

Full text
Abstract:
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication. Design/methodology/approach The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication. Findings In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme. Originality/value The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.
APA, Harvard, Vancouver, ISO, and other styles
41

"Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 2028–33. http://dx.doi.org/10.35940/ijitee.c8817.019320.

Full text
Abstract:
Cyberwarfare is observed very frequently as always some or the other country is targeting to ruin its enemy country by hacking confidential data from vital computer systems. This has led to dangerous international conflicts. Hence, to avoid illicit entry of other than military person or a government official several tools are being used today as spyware. Keyloggers are one of the prominent tools which are used in today’s world to obtain secret or confidential data of a legitimate and contradictory a malicious user too. These keyloggers are advantageous and taken up positively for monitoring employee productivity, for law enforcement and the search for evidence of the crime. While it’s negative illegitimate use includes data theft and passwords. The keylogger is today witnessed as a malicious attack and is looked upon as a security threat. But every coin has two sides. Keylogger actually helps in avoiding several security breaches and also aids in detecting several crimes across the net world followed by other fellow countries. This fact has motivated to write this paper and as a consequence, an experimental analysis too was carried out in order to conclude that keyloggers’ log file helps identify the person by analyzing proper pattern of the words entered in the file. This paper focuses majorly on the aspect of natural language processing, where a log file obtained thru keylogger software is thoroughly processed via the algorithm as described in the paper. The results yielded a fair understanding of the results obtained as one can easily identify the words used and on the basis of that can also know the type of person on the other end with his ideas, malicious one or of a legal kind.
APA, Harvard, Vancouver, ISO, and other styles
42

"BAG: Überwachung des Arbeitnehmer-PCs bei unerlaubter Privatnutzung – Keylogger." Computer und Recht 34, no. 1 (January 1, 2018): 27–30. http://dx.doi.org/10.9785/cr-2018-0109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

"Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme." International Journal of Science and Research (IJSR) 5, no. 6 (June 5, 2016): 2395–99. http://dx.doi.org/10.21275/v5i6.art201629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Fu, Jun, Huan Yang, Yiwen Liang, and Chengyu Tan. "Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy." Journal of Computers 9, no. 6 (June 1, 2014). http://dx.doi.org/10.4304/jcp.9.6.1347-1354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kuncoro, Tri. "PENEGAKAN HUKUM TERHADAP CYBER CRIME DI BIDANG PERBANKAN SEBAGAI KEJAHATAN TRANSNASIONAL." Jurnal Magister Hukum Udayana (Udayana Master Law Journal) 2, no. 3 (November 26, 2013). http://dx.doi.org/10.24843/jmhu.2013.v02.i03.p08.

Full text
Abstract:
ABSTRACTInternet has been used in various fields of life, one of which is banking. Banking activities are performed through Internet-banking. Through the internet-banking service, customers can conduct financial transactions without having to come to the bank. In this study addressed two issues namely the forms of cyber crime in the banking and jurisdiction in the law enforcement against cyber crime in banking. This research is a normative legal research. Legal materials collected through library research. In this research, legal materials were analyzed by using the description, interpretation, argumentation, evaluation and systematization.The forms of cyber crime in banking are typo site, keylogger / keystroke recorder, sniffing, brute-force attacking, deface web, email spamming, denial of service and virus, worm, trojan. Jurisdiction in the law enforcement against cyber crime in banking jurisdiction includes legislative, executive and enforcement jurisdiction. Jurisdiction specifically stipulated in Article 2 of Act of Republic of Indonesia Number 11 of 2008 concerning Information and Electronic Transactions. Banks should have an electronic security system to protect the system. The Law enforcement against cyber crime in banking requires cooperation between countries.
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Jie. "The impact of verbal working memory on written translation: Empirical evidence and an initial model." Linguistica Antverpiensia, New Series – Themes in Translation Studies 19 (January 20, 2021). http://dx.doi.org/10.52034/lanstts.v19i0.558.

Full text
Abstract:
Working memory refers to a metaphorical mental workspace involved in the temporary storage and processing of information which has been considered a key construct in Cognitive Translation Studies. This study investigates whether verbal working memory in the translator’s first and/or second language is related to written translation speed and quality. Through three selection tests, 33 student translators in the second or third year of their Master’s in Translation and Interpreting at nine Chinese universities were selected to participate. In the first test, processing and storage capacities of verbal working memory in their first and second language were assessed separately by means of a dual-task paradigm implemented in the e-Prime software suite. In the second study, participants translated a technical text from their second language to their first language. Their behavioural data were collected with a keylogger and the quality of their translations was evaluated by four expert translators. The correlation analysis suggests that the processing function of verbal working memory in the second language does affect logged translation speed; and that the processing function of verbal working memory in the first language has an effect on translation quality. Furthermore, through regression analysis, an initial model was established, which shows the precise structure of the impact of bilingual working memory on written translation. These findings have significant implications for translation skills training. It appears that additional verbal working memory training for both first and second languages would enhance the students’ translation skills.
APA, Harvard, Vancouver, ISO, and other styles
47

"LAG Hamm: Rechtswidrige Arbeitnehmerüberwachung mittels Keyloggers." Computer und Recht 33, no. 2 (January 1, 2017). http://dx.doi.org/10.9785/cr-2017-0211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography