Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,985,535 papers from all fields of science
Search
Sign In
Create Free Account
Anti-keylogger
Known as:
Anti keylogger
An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software; often, such…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Hardware keylogger
Keystroke logging
Personal identification number
Public computer
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy
Jun Fu
,
Huan Yang
,
Yiwen Liang
,
Chengyu Tan
Journal of Computers
2014
Corpus ID: 15939250
Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of…
Expand
2014
2014
Penggunaan Revealer Keylogger Free 1.33 untuk Pengintaian pada Sistem Komputer
Adil Fadhli
2014
Corpus ID: 62046928
ABSTRAKSI Adil Fadhli, 5041119 Penggunaan Revealer Keylogger Free 1.33 untuk Pengintaian pada Sistem Komputer Penulisan…
Expand
2013
2013
Mimicking User Keystrokes to Detect Keyloggers with Dendritic Cell Algorithm
Fu Jun
,
Yang Huan
,
Liang Yiwen
,
Tan Chengyu
International Conference on Cloud Computing
2013
Corpus ID: 62543770
Evasive software keyloggers hide their malicious behaviors to defeat run-time detection. In this paper, based on the analysis of…
Expand
2012
2012
A Novel Security Scheme for Online Banking Based on Virtual Machine
Bei Guan
,
Y. Wu
,
Yongji Wang
IEEE Sixth International Conference on Software…
2012
Corpus ID: 16127948
Current online banking scheme built on ordinary software stack, which comprises of the operating system and its applications…
Expand
2011
2011
Pembuatan Aplikasi Pencatat Hentakan Keyboard “OnPc Keylogger” Menggunakan Microsoft Visual C# 2008
Teguh Hartanto Marzuki
2011
Corpus ID: 61046482
Begitu bebasnya konten-konten yang berada di internet serta maraknya pemberitaan kasus penculikan dengan modus situs jejaring…
Expand
2011
2011
Les principaux keylogger en « software »
Raymond Labrosse
2011
Corpus ID: 231502940
2009
2009
Re-inforced stealth breakpoints
Amit Vasudevan
Crisis
2009
Corpus ID: 17708410
This paper extends VAMPiRE, a stealth breakpoint framework specifically tailored for microscopic malware analysis. Stealth…
Expand
2007
2007
Schriek, Michael: Geschäftsmodelle im M-Commerce. Eine kritische Analyse der rechtlichen Transparenzerfordernisse. Schriften zum Informations-, Telekommunikations- und Medienrecht, hrsg. von Th…
L. Gramlich
Datenschutz und Datensicherheit - DuD
2007
Corpus ID: 44505395
632 DuD • Datenschutz und Datensicherheit 31 (2007) 8 beim Herunterladen eine extrem aggressive Adware auf den PC installieren…
Expand
2005
2005
Hardware Keylogger Detection
Andy Davis Research
,
Development Manager
2005
Corpus ID: 13914069
This paper provides an analysis of how hardware-based keyloggers work and offers suggestions as to how they may be detected. In…
Expand
2000
2000
Interceptando eventos: Keylogger
C. Ballesteros
2000
Corpus ID: 58385636
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE