Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,583,753 papers from all fields of science
Search
Sign In
Create Free Account
Keystroke logging
Known as:
Keylogging
, Key loggers
, Keyboard watcher
Expand
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Anti-keylogger
Application programming interface
BIOS
Brute-force attack
Expand
Broader (2)
Cybercrime
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2010
2010
A new window on translators' cognitive activity: methodological issues in the combined use of eye tracking, key logging and retrospective protocols
Fábio Alves
,
A. Pagano
,
I. A. L. D. Silva
2010
Corpus ID: 63146031
This paper reports on a study which uses eye tracking in conjunction with key logging and retrospective protocols to propose a…
Expand
2008
2008
Supporting the Reflective Language Learner with Computer Keystroke Logging
E. Lindgren
,
M. Stevenson
,
K. Sullivan
2008
Corpus ID: 61131040
In this chapter an instructional format, Peer-Based Intervention (PBI) using computer keystroke logging is investigated as a…
Expand
Review
2006
Review
2006
Keystroke Logging: An Introduction
Kristyan Spelman Miller
,
K. Sullivan
Computer Key-Stroke Logging and Writing
2006
Corpus ID: 57945895
This chapter introduces the reader to keystroke logging of writing processes as a research method and places this method at the…
Expand
2006
2006
Acoustic Surveillance of Physically Unmodified PCs
M. LeMay
,
Jack Tan
Security and Management
2006
Corpus ID: 17934355
Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known…
Expand
Review
2004
Review
2004
Impacts of Unsustainable Mahogany Logging in Bolivia and Peru
Roberto F. Kometter
,
Martha Martinez
,
A. Blundell
,
R. Gullison
,
M. Steininger
,
R. Rice
2004
Corpus ID: 157645679
Although bigleaf mahogany [Swietenia macrophylla King (Meliaceae)] is the premier timber species of Latin America, its…
Expand
2003
2003
Multirate flowing fluid electric conductivity logging method
C. Tsang
,
C. Doughty
2003
Corpus ID: 54611569
The flowing fluid electric conductivity logging method involves the replacement of well bore water by deionized or constant…
Expand
2003
2003
The thermochron: A truly miniature and inexpensive temperature-logger
M. Angilletta
,
Aaron R. Krochmal
2003
Corpus ID: 24141550
Highly Cited
2003
Highly Cited
2003
Understanding users' keystroke patterns for computer access security
Aykut Güven
,
I. Sogukpinar
Computers & security
2003
Corpus ID: 8588273
1997
1997
User Recognition by Keystroke Latency Pattern Analysis
D. Song
,
P. Venable
,
A. Perrig
1997
Corpus ID: 13212305
We analyze keystroke latency patterns to identify the person typing on the keyboard. Unlike previous work in this domain, which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE