|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 12 occurrences of 11 keywords
|
|
|
Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
70 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
60 | Jami Gayatri Manjeera, Alisha Malla, Masani Venkata Lakshmi Pravallika |
Preventing Malicious Use of Keyloggers Using Anti-Keyloggers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
47 | Jeheon Han, Jonghoon Kwon, Heejo Lee |
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
30 | Akashdeep Bhardwaj, Sam Goundar |
Keyloggers: silent cyber security weapons. |
Netw. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Ijlal Loutfi |
SMMDecoy: Detecting GPU Keyloggers using Security by Deception Techniques. |
ICISSP |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Reiner Creutzburg |
The strange world of keyloggers - an overview, Part I. |
MOBMU |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Itzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, Ponciano Jorge Escamilla-Ambrosio |
Possible Keyloggers Without Implementing a Keyboard in Android. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan 0001, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi |
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. |
Pervasive Mob. Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Ryan M. Gerdes, Saptarshi Mallick |
Physical-Layer Detection of Hardware Keyloggers. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis |
From keyloggers to touchloggers: Take the rough with the smooth. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo |
Unprivileged Black-Box Detection of User-Space Keyloggers. |
IEEE Trans. Dependable Secur. Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith |
Circumventing keyloggers and screendumps. |
MALWARE |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Stefano Ortolani, Bruno Crispo |
NoisyKey: Tolerating Keyloggers via Keystrokes Hiding. |
HotSec |
2012 |
DBLP BibTeX RDF |
|
30 | Jesús Navarro, Enrique Naudon, Daniela Oliveira 0001 |
Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers. |
IEEE Symposium on Security and Privacy Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Adam Howard, Yi Hu |
An approach for detecting malicious keyloggers. |
InfoSecCD |
2012 |
DBLP DOI BibTeX RDF |
|
30 | R. Sreeram Sreenivas, R. Anitha 0002 |
Detecting keyloggers based on traffic analysis with periodic behaviour. |
Netw. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Kalpa Vishnani, Alwyn Roshan Pais, Radhesh Mohandas |
An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures. |
ACC (3) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Oleg Zaitsev |
Skeleton keys: the purpose and applications of keyloggers. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Christopher Wood, Rajendra Raj |
Keyloggers in Cybersecurity Education. |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
30 | Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo |
Bait Your Hook: A Novel Detection Technique for Keyloggers. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Seref Sagiroglu, Gurol Canbek |
Keyloggers: Increasing Threats to Computer Security and Privacy. |
IEEE Technol. Soc. Mag. |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Thorsten Holz, Markus Engelberth, Felix C. Freiling |
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Ming Xu, Behzad Salami 0002, Charlie Obimbo |
How to Protect Personal Information against Keyloggers. |
IMSA |
2005 |
DBLP BibTeX RDF |
|
23 | Helena Rifà-Pous |
A Secure Mobile-Based Authentication System for e-Banking. |
OTM Conferences (2) |
2009 |
DBLP DOI BibTeX RDF |
challenge-response authentication, attacks, mobile security, One-time password |
23 | David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin 0001 |
Automatically Identifying Trigger-based Behavior in Malware. |
Botnet Detection |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter |
AGIS: Towards automatic generation of infection signatures. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
23 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jean-Jacques Quisquater |
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? |
SSS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #30 of 30 (100 per page; Change: )
|
|