Keystroke logging (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Keystroke logging" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
11th place
8th place
5th place
5th place
1,216th place
797th place
652nd place
515th place
102nd place
76th place
low place
low place
710th place
648th place
low place
low place
1,933rd place
1,342nd place
low place
low place
low place
low place
low place
low place
140th place
115th place
7,043rd place
4,687th place
437th place
260th place
low place
low place
low place
low place
low place
low place
9,107th place
6,668th place
low place
low place
low place
low place
low place
low place
low place
low place
153rd place
151st place
low place
low place
low place
low place
low place
low place
1,317th place
873rd place
1,871st place
1,234th place
580th place
462nd place
786th place
558th place
4,521st place
4,877th place
944th place
678th place
low place
low place
193rd place
152nd place
5,990th place
3,752nd place
69th place
59th place
low place
low place
207th place
136th place
low place
low place
low place
low place
3,306th place
3,189th place
149th place
178th place
low place
low place
low place
low place
1,564th place
1,028th place

arxiv.org

  • Spreitzer, Raphael (2014). PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. ACM. pp. 51–62. arXiv:1405.3760. doi:10.1145/2666620.2666622.

bastille.net

berkeley.edu

businessinsider.com

cmu.edu

cups.cs.cmu.edu

cryptomuseum.com

digitalsociety.org

doi.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.
  • Maggi, Federico; Volpatto, Alberto; Gasparini, Simone; Boracchi, Giacomo; Zanero, Stefano (2011). "A fast eavesdropping attack against touchscreens" (PDF). 2011 7th International Conference on Information Assurance and Security (IAS). 7th International Conference on Information Assurance and Security. IEEE. pp. 320–325. doi:10.1109/ISIAS.2011.6122840. ISBN 978-1-4577-2155-7.
  • Marquardt, Philip; Verma, Arunabh; Carter, Henry; Traynor, Patrick (2011). (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. Proceedings of the 18th ACM conference on Computer and communications security. ACM. pp. 561–562. doi:10.1145/2046707.2046771.
  • Owusu, Emmanuel; Han, Jun; Das, Sauvik; Perrig, Adrian; Zhang, Joy (2012). ACCessory: password inference using accelerometers on smartphones. Proceedings of the Thirteenth Workshop on Mobile Computing Systems and Applications. ACM. doi:10.1145/2162081.2162095.
  • Aviv, Adam J.; Sapp, Benjamin; Blaze, Matt; Smith, Jonathan M. (2012). "Practicality of accelerometer side channels on smartphones". Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. Proceedings of the 28th Annual Computer Security Applications Conference. ACM. p. 41. doi:10.1145/2420950.2420957. ISBN 9781450313124.
  • Xu, Zhi; Bai, Kun; Zhu, Sencun (2012). TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. ACM. pp. 113–124. doi:10.1145/2185448.2185465.
  • Miluzzo, Emiliano; Varshavsky, Alexander; Balakrishnan, Suhrid; Choudhury, Romit Roy (2012). Tapprints: your finger taps have fingerprints. Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM. pp. 323–336. doi:10.1145/2307636.2307666.
  • Spreitzer, Raphael (2014). PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. ACM. pp. 51–62. arXiv:1405.3760. doi:10.1145/2666620.2666622.
  • Young, Adam; Yung, Moti (1997). "Deniable password snatching: On the possibility of evasive electronic espionage". Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097). pp. 224–235. doi:10.1109/SECPRI.1997.601339. ISBN 978-0-8186-7828-8. S2CID 14768587.
  • Young, Adam; Yung, Moti (1996). "Cryptovirology: Extortion-based security threats and countermeasures". Proceedings 1996 IEEE Symposium on Security and Privacy. pp. 129–140. CiteSeerX 10.1.1.44.9122. doi:10.1109/SECPRI.1996.502676. ISBN 978-0-8186-7417-4. S2CID 12179472.
  • Creutzburg, Reiner (2017-01-29). "The strange world of keyloggers - an overview, Part I". Electronic Imaging. 2017 (6): 139–148. doi:10.2352/ISSN.2470-1173.2017.6.MOBMU-313.
  • Goring, Stuart P.; Rabaiotti, Joseph R.; Jones, Antonia J. (2007-09-01). "Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences". Computers & Security. 26 (6): 421–426. doi:10.1016/j.cose.2007.05.003. ISSN 0167-4048.

ed.ac.uk

inf.ed.ac.uk

epfl.ch

infoscience.epfl.ch

hakin9.org

  • Hameiri, Paz (2019). "Body Keylogging". Hakin9 IT Security Magazine. 14 (7): 79–94.

handle.net

hdl.handle.net

ieee.org

ieeexplore.ieee.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.

ingentaconnect.com

inquirer.net

technology.inquirer.net

ivizsecurity.com

keylogger.org

krebsonsecurity.com

microsoft.com

msdn.microsoft.com

networkintercept.com

nsa.gov

oxforddictionaries.com

pctools.com

pcworld.com

privateinternetaccess.com

psu.edu

citeseerx.ist.psu.edu

qccglobal.com

sciencedirect.com

securelist.com

securitydigest.org

securitysupervisor.com

semanticscholar.org

api.semanticscholar.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.
  • Young, Adam; Yung, Moti (1997). "Deniable password snatching: On the possibility of evasive electronic espionage". Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097). pp. 224–235. doi:10.1109/SECPRI.1997.601339. ISBN 978-0-8186-7828-8. S2CID 14768587.
  • Young, Adam; Yung, Moti (1996). "Cryptovirology: Extortion-based security threats and countermeasures". Proceedings 1996 IEEE Symposium on Security and Privacy. pp. 129–140. CiteSeerX 10.1.1.44.9122. doi:10.1109/SECPRI.1996.502676. ISBN 978-0-8186-7417-4. S2CID 12179472.

snopes.com

  • "ATM camera". www.snopes.com. 19 January 2004. Retrieved 2009-04-19.

spyreveal.com

spyrix.com

spywareloop.com

symantec.com

syssec-project.eu

themoscownews.com

theregister.co.uk

threatpost.com

ucsd.edu

cseweb.ucsd.edu

usenix.org

web.archive.org

windowssecrets.com

wired.com

worldcat.org

search.worldcat.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Goring, Stuart P.; Rabaiotti, Joseph R.; Jones, Antonia J. (2007-09-01). "Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences". Computers & Security. 26 (6): 421–426. doi:10.1016/j.cose.2007.05.003. ISSN 0167-4048.

zdnet.com