|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8 occurrences of 8 keywords
|
|
|
Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
53 | Thorsten Holz, Markus Engelberth, Felix C. Freiling |
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
53 | M. N. Doja 0001, Naveen Kumar 0008 |
Image Authentication Schemes against Key-Logger Spyware. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
|
36 | |
User Confidence-and the Software Developer. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
keylogger, trust, firewall, virus, spyware, adware |
32 | Dmitry Levshun, Diana Levshun |
Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity. |
COMSNETS |
2024 |
DBLP DOI BibTeX RDF |
|
32 | Marco Salas-Nino, Grant Ritter, Daniel Hamdan, Tao Wang, Tao Hou |
The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Álvaro Arribas Royo, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, Theofilos Toulkeridis |
Malware Security Evasion Techniques: An Original Keylogger Implementation. |
WorldCIST (1) |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Huseyn Huseynov, Kenichi Kourai, Tarek N. Saadawi, Obinna Igbe |
Virtual Machine Introspection for Anomaly-Based Keylogger Detection. |
HPSR |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa |
A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. |
CSS |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu |
An Online Approach for Kernel-level Keylogger Detection and Defense. |
J. Inf. Sci. Eng. |
2017 |
DBLP BibTeX RDF |
|
32 | Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi |
Keylogger Detection Using a Decoy Keyboard. |
DBSec |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Stephanie Vogelgesang, Stefan Hessel, Frederik Möllers |
Hardware-Keylogger: Die Tastatur in der Hand des Feindes. |
Datenschutz und Datensicherheit |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Adrianna Kozierkiewicz-Hetmanska, Aleksander Marciniak, Marcin Pietranik |
User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks. |
ICCCI (1) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Junsung Cho, Geumhwan Cho, Hyoungshick Kim |
Keyboard or keylogger?: A security analysis of third-party keyboards on Android. |
PST |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Jun Fu, Huan Yang, Yiwen Liang, Chengyu Tan |
Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy. |
J. Comput. |
2014 |
DBLP BibTeX RDF |
|
32 | Tobias Fiebig, Janis Danisevskis, Marta Piekarska |
A Metric for the Evaluation and Comparison of Keylogger Performance. |
CSET |
2014 |
DBLP BibTeX RDF |
|
32 | Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi |
Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. |
SSCC |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Thorsten Holz, Markus Engelberth, Felix C. Freiling |
Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. |
GI Jahrestagung |
2009 |
DBLP BibTeX RDF |
|
26 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
Displaying result #1 - #19 of 19 (100 per page; Change: )
|
|