The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for keyloggers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2010 (15) 2011-2023 (15)
Publication types (Num. hits)
article(8) incollection(1) inproceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 11 keywords

Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
70Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
60Jami Gayatri Manjeera, Alisha Malla, Masani Venkata Lakshmi Pravallika Preventing Malicious Use of Keyloggers Using Anti-Keyloggers. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
47Jeheon Han, Jonghoon Kwon, Heejo Lee HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
30Akashdeep Bhardwaj, Sam Goundar Keyloggers: silent cyber security weapons. Search on Bibsonomy Netw. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Ijlal Loutfi SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Reiner Creutzburg The strange world of keyloggers - an overview, Part I. Search on Bibsonomy MOBMU The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Itzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, Ponciano Jorge Escamilla-Ambrosio Possible Keyloggers Without Implementing a Keyboard in Android. Search on Bibsonomy ATCS/SePrIoT@SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan 0001, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Search on Bibsonomy Pervasive Mob. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Ryan M. Gerdes, Saptarshi Mallick Physical-Layer Detection of Hardware Keyloggers. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis From keyloggers to touchloggers: Take the rough with the smooth. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo Unprivileged Black-Box Detection of User-Space Keyloggers. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith Circumventing keyloggers and screendumps. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Stefano Ortolani, Bruno Crispo NoisyKey: Tolerating Keyloggers via Keystrokes Hiding. Search on Bibsonomy HotSec The full citation details ... 2012 DBLP  BibTeX  RDF
30Jesús Navarro, Enrique Naudon, Daniela Oliveira 0001 Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Adam Howard, Yi Hu An approach for detecting malicious keyloggers. Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30R. Sreeram Sreenivas, R. Anitha 0002 Detecting keyloggers based on traffic analysis with periodic behaviour. Search on Bibsonomy Netw. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Kalpa Vishnani, Alwyn Roshan Pais, Radhesh Mohandas An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures. Search on Bibsonomy ACC (3) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Oleg Zaitsev Skeleton keys: the purpose and applications of keyloggers. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30Christopher Wood, Rajendra Raj Keyloggers in Cybersecurity Education. Search on Bibsonomy Security and Management The full citation details ... 2010 DBLP  BibTeX  RDF
30Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo Bait Your Hook: A Novel Detection Technique for Keyloggers. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30Seref Sagiroglu, Gurol Canbek Keyloggers: Increasing Threats to Computer Security and Privacy. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Thorsten Holz, Markus Engelberth, Felix C. Freiling Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Ming Xu, Behzad Salami 0002, Charlie Obimbo How to Protect Personal Information against Keyloggers. Search on Bibsonomy IMSA The full citation details ... 2005 DBLP  BibTeX  RDF
23Helena Rifà-Pous A Secure Mobile-Based Authentication System for e-Banking. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF challenge-response authentication, attacks, mobile security, One-time password
23David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 Automatically Identifying Trigger-based Behavior in Malware. Search on Bibsonomy Botnet Detection The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter AGIS: Towards automatic generation of infection signatures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
23Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Jean-Jacques Quisquater The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #30 of 30 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license