Journal articles on the topic 'Keylogger'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 journal articles for your research on the topic 'Keylogger.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S. Li, L., Z. M. Fauzee, N. Zamin, N. Kamarudin, N. A.Sabri, and N. S.Nik Ab Aziz. "An Encrypted Log File Keylogger System for Parental Control." International Journal of Engineering & Technology 7, no. 2.28 (May 16, 2018): 193. http://dx.doi.org/10.14419/ijet.v7i2.28.12910.
Full textSingh, Arjun, Pushpa Choudhary, Akhilesh kumar singh, and Dheerendra kumar tyagi. "Keylogger Detection and Prevention." Journal of Physics: Conference Series 2007, no. 1 (August 1, 2021): 012005. http://dx.doi.org/10.1088/1742-6596/2007/1/012005.
Full textYadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.
Full textGuryanov, Konstantin V. "THE PROJECT "GUNMAN": FIRST KEYLOGGER." Basis, no. 2 (2020): 79–91. http://dx.doi.org/10.51962/2587-8042_2020_8_79.
Full textK.S, Jayalekshmi. "Foiling Keylogger Attacks using Virtual Onscreen Keyboard." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 635–39. http://dx.doi.org/10.26438/ijcse/v7i2.635639.
Full textAron, Jacob. "Touchscreen keylogger captures details from your taps." New Scientist 211, no. 2825 (August 2011): 21. http://dx.doi.org/10.1016/s0262-4079(11)61950-7.
Full textJose, Bonia, Elizabeth Biju, Farsana A A, and Rijo M P. "WIRELESS HARDWARE KEYLOGGER USING ARDUINO LEONARDO AND NODEMCU." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 513–16. http://dx.doi.org/10.33564/ijeast.2020.v05i01.091.
Full textBayzid, Md, Mohiuddin Shoikot, Jafrul Hossain, and Anisur Rahman. "Keylogger Detection using Memory Forensic and Network Monitoring." International Journal of Computer Applications 177, no. 11 (October 17, 2019): 17–21. http://dx.doi.org/10.5120/ijca2019919483.
Full textDwivedi, Aarushi, Krishna Chandra Tripathi, and M. L. Sharma. "Advanced Keylogger- A Stealthy Malware for Computer Monitoring." ASIAN JOURNAL OF CONVERGENCE IN TECHNOLOGY 7, no. 1 (April 6, 2021): 137–40. http://dx.doi.org/10.33130/ajct.2021v07i01.028.
Full textVogelgesang, Stephanie, Stefan Hessel, and Frederik Möllers. "Hardware-Keylogger: Die Tastatur in der Hand des Feindes." Datenschutz und Datensicherheit - DuD 40, no. 11 (October 13, 2016): 729–34. http://dx.doi.org/10.1007/s11623-016-0692-9.
Full textBarankova, I., U. V. Mikhailova, and G. I. Lukyanov. "DEVELOPMENT OF SOFTWARE AND HARDWARE MEANS OF IDENTIFICATION OF HIDDEN USB-KEYLOGGER DEVICES." Dynamics of Systems, Mechanisms and Machines 7, no. 4 (2019): 066–71. http://dx.doi.org/10.25206/2310-9793-7-4-66-71.
Full textGuntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (May 30, 2018): 12–21. http://dx.doi.org/10.31849/digitalzone.v9i1.648.
Full textGuntoro, Guntoro, and Muhammad Fikri. "Perancangan Aplikasi Single Sign-On Menggunakan Autentikasi Gambar." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 9, no. 1 (May 30, 2018): 12–21. http://dx.doi.org/10.31849/dz.v9i1.648.
Full textBarankova, I. I., U. V. Mikhailova, and G. I. Lukyanov. "Software development and hardware means of hidden usb-keylogger devices identification." Journal of Physics: Conference Series 1441 (January 2020): 012032. http://dx.doi.org/10.1088/1742-6596/1441/1/012032.
Full textRahim, Robbi, Heri Nurdiyanto, Ansari Saleh A, Dahlan Abdullah, Dedy Hartama, and Darmawan Napitupulu. "Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm." Journal of Physics: Conference Series 954 (January 2018): 012008. http://dx.doi.org/10.1088/1742-6596/954/1/012008.
Full textHilmi, Muhammad Anis Al, A. Sumarudin, and Willy Permana Putra. "ONE-TIME-PASSWORD (OTP) DENGAN MODIFIKASI VIGENERE CHIPER DAN PERANGKAT USB BERBASIS MICROCONTROLLER, SENSOR FINGERPRINT, DAN REAL TIME CLOCK (RTC) UNTUK AUTENTIKASI PENGGUNA PADA AKSES APLIKASI WEB." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 6–11. http://dx.doi.org/10.14421/csecurity.2020.3.2.2082.
Full textSchreiner, Paul. "2018/5 Evidence from long-term keylogger surveillance cannot be used in a dismissal lawsuit (GE)." European Employment Law Cases 3, no. 1 (May 2018): 28–31. http://dx.doi.org/10.5553/eelc/187791072018003001006.
Full textAraghian, Roya, Behzad Ghonsooly, and Afsaneh Ghanizadeh. "Investigating problem-solving strategies of translation trainees with high and low levels of self-efficacy." Translation, Cognition & Behavior 1, no. 1 (March 2, 2018): 74–97. http://dx.doi.org/10.1075/tcb.00004.ara.
Full textNugraha, Julian Dwi, Avon Budiono, and Ahmad Almaarif. "Analisis Malware Berdasarkan API Call Memory Dengan Metode Deteksi Signature-Based." Jurnal Rekayasa Sistem & Industri (JRSI) 6, no. 02 (December 20, 2019): 77. http://dx.doi.org/10.25124/jrsi.v6i02.351.
Full textJiménez-Crespo, Miguel A., and Joseph V. Casillas. "Literal is not always easier." Translation, Cognition & Behavior 4, no. 1 (June 7, 2021): 98–123. http://dx.doi.org/10.1075/tcb.00048.jim.
Full textSagiroglu, Seref, and Gurol Canbek. "Keyloggers." IEEE Technology and Society Magazine 28, no. 3 (2009): 10–17. http://dx.doi.org/10.1109/mts.2009.934159.
Full textChahrvin, Sacha. "Keyloggers – your security nightmare?" Computer Fraud & Security 2007, no. 7 (July 2007): 10–11. http://dx.doi.org/10.1016/s1361-3723(07)70090-8.
Full textPrajapati, Viraj. "Analysis of Keyloggers in Cybersecurity." International Journal for Research in Applied Science and Engineering Technology 8, no. 10 (October 31, 2020): 466–74. http://dx.doi.org/10.22214/ijraset.2020.31925.
Full textBhardwaj, Akashdeep, and Sam Goundar. "Keyloggers: silent cyber security weapons." Network Security 2020, no. 2 (February 2020): 14–19. http://dx.doi.org/10.1016/s1353-4858(20)30021-0.
Full textHeron, Simon. "The rise and rise of the keyloggers." Network Security 2007, no. 6 (June 2007): 4–6. http://dx.doi.org/10.1016/s1353-4858(07)70052-1.
Full textZaitsev, Oleg. "Skeleton keys: the purpose and applications of keyloggers." Network Security 2010, no. 10 (October 2010): 12–17. http://dx.doi.org/10.1016/s1353-4858(10)70126-4.
Full textOrtolani, Stefano, Cristiano Giuffrida, and Bruno Crispo. "Unprivileged Black-Box Detection of User-Space Keyloggers." IEEE Transactions on Dependable and Secure Computing 10, no. 1 (January 2013): 40–52. http://dx.doi.org/10.1109/tdsc.2012.76.
Full textWaterson, Dave. "How Keyloggers Work and How To Defeat Them." ITNOW 63, no. 1 (February 16, 2021): 40–41. http://dx.doi.org/10.1093/itnow/bwab017.
Full textCreutzburg, Reiner. "The strange world of keyloggers - an overview, Part I." Electronic Imaging 2017, no. 6 (January 29, 2017): 139–48. http://dx.doi.org/10.2352/issn.2470-1173.2017.6.mobmu-313.
Full textSreenivas, R. Sreeram, and R. Anitha. "Detecting keyloggers based on traffic analysis with periodic behaviour." Network Security 2011, no. 7 (July 2011): 14–19. http://dx.doi.org/10.1016/s1353-4858(11)70076-9.
Full textAdhikary, Nairit, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, and Vrijendra Singh. "Battering Keyloggers and Screen Recording Software by Fabricating Passwords." International Journal of Computer Network and Information Security 4, no. 5 (June 1, 2012): 13–21. http://dx.doi.org/10.5815/ijcnis.2012.05.02.
Full textPillai, Divyadev, and Irfan Siddavatam. "A modified framework to detect keyloggers using machine learning algorithm." International Journal of Information Technology 11, no. 4 (September 3, 2018): 707–12. http://dx.doi.org/10.1007/s41870-018-0237-6.
Full textDamopoulos, D., G. Kambourakis, and S. Gritzalis. "From keyloggers to touchloggers: Take the rough with the smooth." Computers & Security 32 (February 2013): 102–14. http://dx.doi.org/10.1016/j.cose.2012.10.002.
Full textHung, Chien Wei, Fu Hau Hsu, Shih Jen Chen, Yan Ling Hwang, Chang Kuo Tso, and Li Pin Hsu. "Defend a System against Keyloggers with a Privilege-Limited Account." Applied Mechanics and Materials 284-287 (January 2013): 3385–89. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3385.
Full textFougner Rydning, Atin. "The Return of Sense on the Scene of Translation Studies in the Light of the Cognitive Blending Theory." Meta 50, no. 2 (July 20, 2005): 392–404. http://dx.doi.org/10.7202/010989ar.
Full text., Prathamesh Bhosale. "KEYLOGG - A TOUCH BASED KEY LOGGING APPLICATION." International Journal of Research in Engineering and Technology 05, no. 04 (April 25, 2016): 12–15. http://dx.doi.org/10.15623/ijret.2016.0504003.
Full textSri Ram Varma, D., K. Meghana, V. Sai Deepak, and R. Murugan. "Graphical password scheme to diminish shoulder surfing." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 234. http://dx.doi.org/10.14419/ijet.v7i1.1.9474.
Full textFu, Shen, Mathew L. Wymore, Ting-Wei Chang, and Daji Qiao. "A Novel Software System Protection Scheme Based on Behavior and Context Monitoring." International Journal of Systems and Software Security and Protection 10, no. 1 (January 2019): 22–46. http://dx.doi.org/10.4018/ijsssp.2019010102.
Full textHussain, Muzammil, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, M. L. Mat Kiah, Nor Badrul Anuar, and Mohamed Abdulnabi. "The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks." Pervasive and Mobile Computing 25 (January 2016): 1–25. http://dx.doi.org/10.1016/j.pmcj.2015.12.001.
Full textAl-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (October 10, 2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.
Full text"Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 2028–33. http://dx.doi.org/10.35940/ijitee.c8817.019320.
Full text"BAG: Überwachung des Arbeitnehmer-PCs bei unerlaubter Privatnutzung – Keylogger." Computer und Recht 34, no. 1 (January 1, 2018): 27–30. http://dx.doi.org/10.9785/cr-2018-0109.
Full text"Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme." International Journal of Science and Research (IJSR) 5, no. 6 (June 5, 2016): 2395–99. http://dx.doi.org/10.21275/v5i6.art201629.
Full textFu, Jun, Huan Yang, Yiwen Liang, and Chengyu Tan. "Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy." Journal of Computers 9, no. 6 (June 1, 2014). http://dx.doi.org/10.4304/jcp.9.6.1347-1354.
Full textKuncoro, Tri. "PENEGAKAN HUKUM TERHADAP CYBER CRIME DI BIDANG PERBANKAN SEBAGAI KEJAHATAN TRANSNASIONAL." Jurnal Magister Hukum Udayana (Udayana Master Law Journal) 2, no. 3 (November 26, 2013). http://dx.doi.org/10.24843/jmhu.2013.v02.i03.p08.
Full textLi, Jie. "The impact of verbal working memory on written translation: Empirical evidence and an initial model." Linguistica Antverpiensia, New Series – Themes in Translation Studies 19 (January 20, 2021). http://dx.doi.org/10.52034/lanstts.v19i0.558.
Full text"LAG Hamm: Rechtswidrige Arbeitnehmerüberwachung mittels Keyloggers." Computer und Recht 33, no. 2 (January 1, 2017). http://dx.doi.org/10.9785/cr-2017-0211.
Full text