Keystroke logging

Known as: Keylogging, Key loggers, Keyboard watcher 
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
As hackers develop sophisticated phishing and social engineering attacks, it is recommended that users be aware of common tactics… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Keystroke privacy is critical for ensuring the security of computer systems and the privacy of human users as what being typed… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Spontaneous writing observed in chats, instant messengers, and social media has become established as productive modes of… (More)
  • table 1
  • figure 2
  • table 2
  • table 3
  • table 4
Is this relevant?
2013
2013
Unlike conventional “one shot” biometric authentication schemes, continuous authentication has a number of advantages, such as… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
  • Tom Olzak
  • Encyclopedia of Cryptography and Security
  • 2011
Cybercriminals have devised many methods to obtain sensitive information from your endpoint devices. However, few of them are as… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
Keystroke dynamics is the process of identifying individual users on the basis of their typing rhythms, which are in turn derived… (More)
  • figure 1
  • table 1
Is this relevant?
Review
2009
Review
2009
Not only has the use of computers as writing instruments had a profound effect on writing practice and attitudes towards writing… (More)
  • figure 1
  • figure 2
  • figure 4
  • table 1
  • figure 5
Is this relevant?
2007
2007
This paper investigates the security of Bluetooth. We detail the vulnerability of Bluetooth keyboards to keystroke logging. We… (More)
  • table 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
This paper presents a new algorithm for servicing soft deadline aperiodic tasks in II red-time system in which hard deadline… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?