The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for keylogger with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2018 (15) 2020-2024 (4)
Publication types (Num. hits)
article(6) inproceedings(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8 occurrences of 8 keywords

Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
53Thorsten Holz, Markus Engelberth, Felix C. Freiling Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53M. N. Doja 0001, Naveen Kumar 0008 Image Authentication Schemes against Key-Logger Spyware. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36 User Confidence-and the Software Developer. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF keylogger, trust, firewall, virus, spyware, adware
32Dmitry Levshun, Diana Levshun Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
32Marco Salas-Nino, Grant Ritter, Daniel Hamdan, Tao Wang, Tao Hou The Evolution of Keylogger Technologies: A Survey from Historical Origins to Emerging Opportunities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Álvaro Arribas Royo, Manuel Sánchez Rubio, Walter Fuertes, Mauro Callejas Cuervo, Carlos Andrés Estrada, Theofilos Toulkeridis Malware Security Evasion Techniques: An Original Keylogger Implementation. Search on Bibsonomy WorldCIST (1) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Huseyn Huseynov, Kenichi Kourai, Tarek N. Saadawi, Obinna Igbe Virtual Machine Introspection for Anomaly-Based Keylogger Detection. Search on Bibsonomy HPSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Hugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. Search on Bibsonomy CSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu An Online Approach for Kernel-level Keylogger Detection and Defense. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2017 DBLP  BibTeX  RDF
32Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi Keylogger Detection Using a Decoy Keyboard. Search on Bibsonomy DBSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Stephanie Vogelgesang, Stefan Hessel, Frederik Möllers Hardware-Keylogger: Die Tastatur in der Hand des Feindes. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Adrianna Kozierkiewicz-Hetmanska, Aleksander Marciniak, Marcin Pietranik User Authentication Through Keystroke Dynamics as the Protection Against Keylogger Attacks. Search on Bibsonomy ICCCI (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Junsung Cho, Geumhwan Cho, Hyoungshick Kim Keyboard or keylogger?: A security analysis of third-party keyboards on Android. Search on Bibsonomy PST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Jun Fu, Huan Yang, Yiwen Liang, Chengyu Tan Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy. Search on Bibsonomy J. Comput. The full citation details ... 2014 DBLP  BibTeX  RDF
32Tobias Fiebig, Janis Danisevskis, Marta Piekarska A Metric for the Evaluation and Comparison of Keylogger Performance. Search on Bibsonomy CSET The full citation details ... 2014 DBLP  BibTeX  RDF
32Mohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. Search on Bibsonomy SSCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32Thorsten Holz, Markus Engelberth, Felix C. Freiling Eine Analyse von 33 Gigabyte gestohlener Keylogger-Daten. Search on Bibsonomy GI Jahrestagung The full citation details ... 2009 DBLP  BibTeX  RDF
26Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications
Displaying result #1 - #19 of 19 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license