Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,641,356 papers from all fields of science
Search
Sign In
Create Free Account
Keystroke logging
Known as:
Keylogging
, Key loggers
, Keyboard watcher
Expand
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Anti-keylogger
Application programming interface
BIOS
Brute-force attack
Expand
Broader (2)
Cybercrime
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Minimizing Risks of Invasive Alien Plant Species in Tropical Production Forest Management
M. Padmanaba
,
R. Corlett
2014
Corpus ID: 86229012
Timber production is the most pervasive human impact on tropical forests, but studies of logging impacts have largely focused on…
Expand
2007
2007
Improving Seabed Logging Sensitivity in Shallow Water Through Up-Down Separation
F. Roth
,
F. Maaø
2007
Corpus ID: 55072896
Summary A shallow water Seabed Logging (SBL) model is presented to demonstrate that airwave removal by separation of up- and…
Expand
2007
2007
Securing Network Input via a Trusted Input Proxy
Kevin Borders
,
A. Prakash
USENIX conference on Hot topics in security
2007
Corpus ID: 10011301
The increasing popularity of online transactions involving sensitive personal data, such as bank account and social security…
Expand
Review
2006
Review
2006
Keystroke Logging: An Introduction
Kristyan Spelman Miller
,
K. Sullivan
Computer Key-Stroke Logging and Writing
2006
Corpus ID: 57945895
This chapter introduces the reader to keystroke logging of writing processes as a research method and places this method at the…
Expand
2006
2006
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
D. Florêncio
,
Cormac Herley
Asia-Pacific Computer Systems Architecture…
2006
Corpus ID: 8480941
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we…
Expand
2006
2006
Acoustic Surveillance of Physically Unmodified PCs
M. LeMay
,
Jack Tan
Security and Management
2006
Corpus ID: 17934355
Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known…
Expand
2003
2003
The thermochron: A truly miniature and inexpensive temperature-logger
M. Angilletta
,
Aaron R. Krochmal
2003
Corpus ID: 24141550
Highly Cited
2003
Highly Cited
2003
Understanding users' keystroke patterns for computer access security
Aykut Güven
,
I. Sogukpinar
Computers & security
2003
Corpus ID: 8588273
1997
1997
User Recognition by Keystroke Latency Pattern Analysis
D. Song
,
P. Venable
,
A. Perrig
1997
Corpus ID: 13212305
We analyze keystroke latency patterns to identify the person typing on the keyboard. Unlike previous work in this domain, which…
Expand
1993
1993
DETECTION TECHNOLOGY FOR IVHS
L. Klein
,
M. MacCalden
,
M. Mills
1993
Corpus ID: 107136813
A two-and-a-half year, Federal Highway Administration sponsored program was begun by Hughes Aircraft and JHK during the fall of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required