Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hardware keylogger

Known as: Hardware keyloggers, KeySpyer, Physical keylogger 
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A partial password is a mode of password-based authentication that is widely used, especially in the financial sector. It is… Expand
  • table 1
  • figure 1
  • figure 2
2016
2016
ZusammenfassungHardware-Keylogger sind bereits seit Jahrzehnten bekannt — ihr Gefährdungspotential hat sich jedoch kaum… Expand
2016
2016
The uses and capabilities of rogue USB hardware implants for use in cyber espionage activities is still very much an unknown… Expand
  • figure 1
2015
2015
This work examines the general problem of detecting the presence of hardware keyloggers HKLs, and specifically focuses on HKLs… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
2012
2012
6 Abstract — The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
2011
2011
Security and privacy are key challenges for every computer user. While various security mechanisms, such as anti-virus, anti… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 7
2010
2010
  • E. Knight
  • Netw. Secur.
  • 2010
  • Corpus ID: 206126524
Perhaps your organisation has recently suffered a data breach, which would not be uncommon as last year set records for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Review
2005
Review
2005
..........................................................................................................................4… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • table 4