Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,973,917 papers from all fields of science
Search
Sign In
Create Free Account
Keystroke logging
Known as:
Keylogging
, Key loggers
, Keyboard watcher
Expand
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Anti-keylogger
Application programming interface
BIOS
Brute-force attack
Expand
Broader (2)
Cybercrime
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Minimizing Risks of Invasive Alien Plant Species in Tropical Production Forest Management
M. Padmanaba
,
R. Corlett
2014
Corpus ID: 86229012
Timber production is the most pervasive human impact on tropical forests, but studies of logging impacts have largely focused on…
Expand
Highly Cited
2011
Highly Cited
2011
Pico: No More Passwords!
F. Stajano
Security Protocols Workshop
2011
Corpus ID: 16190648
From a usability viewpoint, passwords and PINs have reached the end of their useful life. Even though they are convenient for…
Expand
2007
2007
Improving Seabed Logging Sensitivity in Shallow Water Through Up-Down Separation
F. Roth
,
F. Maaø
2007
Corpus ID: 55072896
Summary A shallow water Seabed Logging (SBL) model is presented to demonstrate that airwave removal by separation of up- and…
Expand
Review
2006
Review
2006
Keystroke Logging: An Introduction
Kristyan Spelman Miller
,
K. Sullivan
Computer Key-Stroke Logging and Writing
2006
Corpus ID: 57945895
This chapter introduces the reader to keystroke logging of writing processes as a research method and places this method at the…
Expand
2006
2006
Acoustic Surveillance of Physically Unmodified PCs
M. LeMay
,
Jack Tan
Security and Management
2006
Corpus ID: 17934355
Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known…
Expand
2006
2006
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
D. Florêncio
,
Cormac Herley
Asia-Pacific Computer Systems Architecture…
2006
Corpus ID: 8480941
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we…
Expand
2003
2003
Multirate flowing fluid electric conductivity logging method
C. Tsang
,
C. Doughty
2003
Corpus ID: 54611569
The flowing fluid electric conductivity logging method involves the replacement of well bore water by deionized or constant…
Expand
2003
2003
The thermochron: A truly miniature and inexpensive temperature-logger
M. Angilletta
,
Aaron R. Krochmal
2003
Corpus ID: 24141550
Highly Cited
2003
Highly Cited
2003
Understanding users' keystroke patterns for computer access security
Aykut Güven
,
I. Sogukpinar
Computers & security
2003
Corpus ID: 8588273
1997
1997
User Recognition by Keystroke Latency Pattern Analysis
D. Song
,
P. Venable
,
A. Perrig
1997
Corpus ID: 13212305
We analyze keystroke latency patterns to identify the person typing on the keyboard. Unlike previous work in this domain, which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE