Keystroke logging (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Keystroke logging" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
11th place
8th place
5th place
5th place
1,216th place
797th place
18th place
17th place
102nd place
76th place
low place
low place
710th place
648th place
low place
low place
1,933rd place
1,342nd place
low place
low place
low place
low place
low place
low place
140th place
115th place
7,043rd place
4,687th place
437th place
260th place
low place
low place
low place
low place
low place
low place
low place
low place
9,107th place
6,668th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
153rd place
151st place
low place
low place
low place
low place
low place
low place
1,317th place
873rd place
1,871st place
1,234th place
580th place
462nd place
786th place
558th place
4,521st place
4,877th place
944th place
678th place
low place
low place
193rd place
152nd place
5,990th place
3,752nd place
69th place
59th place
low place
low place
207th place
136th place
low place
low place
low place
low place
3,306th place
3,189th place
149th place
178th place
low place
low place
low place
low place
1,564th place
1,028th place

arxiv.org (Global: 69th place; English: 59th place)

  • Spreitzer, Raphael (2014). PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. ACM. pp. 51–62. arXiv:1405.3760. doi:10.1145/2666620.2666622.

bastille.net (Global: low place; English: low place)

berkeley.edu (Global: 580th place; English: 462nd place)

businessinsider.com (Global: 140th place; English: 115th place)

cmu.edu (Global: 1,564th place; English: 1,028th place)

cups.cs.cmu.edu

cryptomuseum.com (Global: low place; English: low place)

digitalsociety.org (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. Bibcode:2014ITMC...13.2566N. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.
  • Maggi, Federico; Volpatto, Alberto; Gasparini, Simone; Boracchi, Giacomo; Zanero, Stefano (2011). "A fast eavesdropping attack against touchscreens" (PDF). 2011 7th International Conference on Information Assurance and Security (IAS). 7th International Conference on Information Assurance and Security. IEEE. pp. 320–325. doi:10.1109/ISIAS.2011.6122840. ISBN 978-1-4577-2155-7.
  • Marquardt, Philip; Verma, Arunabh; Carter, Henry; Traynor, Patrick (2011). (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. Proceedings of the 18th ACM conference on Computer and communications security. ACM. pp. 561–562. doi:10.1145/2046707.2046771.
  • Owusu, Emmanuel; Han, Jun; Das, Sauvik; Perrig, Adrian; Zhang, Joy (2012). ACCessory: password inference using accelerometers on smartphones. Proceedings of the Thirteenth Workshop on Mobile Computing Systems and Applications. ACM. doi:10.1145/2162081.2162095.
  • Aviv, Adam J.; Sapp, Benjamin; Blaze, Matt; Smith, Jonathan M. (2012). "Practicality of accelerometer side channels on smartphones". Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. Proceedings of the 28th Annual Computer Security Applications Conference. ACM. p. 41. doi:10.1145/2420950.2420957. ISBN 9781450313124.
  • Xu, Zhi; Bai, Kun; Zhu, Sencun (2012). TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. ACM. pp. 113–124. doi:10.1145/2185448.2185465.
  • Miluzzo, Emiliano; Varshavsky, Alexander; Balakrishnan, Suhrid; Choudhury, Romit Roy (2012). Tapprints: your finger taps have fingerprints. Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM. pp. 323–336. doi:10.1145/2307636.2307666.
  • Spreitzer, Raphael (2014). PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices. Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. ACM. pp. 51–62. arXiv:1405.3760. doi:10.1145/2666620.2666622.
  • Young, Adam; Yung, Moti (1997). "Deniable password snatching: On the possibility of evasive electronic espionage". Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097). pp. 224–235. doi:10.1109/SECPRI.1997.601339. ISBN 978-0-8186-7828-8. S2CID 14768587.
  • Young, Adam; Yung, Moti (1996). "Cryptovirology: Extortion-based security threats and countermeasures". Proceedings 1996 IEEE Symposium on Security and Privacy. pp. 129–140. CiteSeerX 10.1.1.44.9122. doi:10.1109/SECPRI.1996.502676. ISBN 978-0-8186-7417-4. S2CID 12179472.
  • Creutzburg, Reiner (2017-01-29). "The strange world of keyloggers - an overview, Part I". Electronic Imaging. 2017 (6): 139–148. doi:10.2352/ISSN.2470-1173.2017.6.MOBMU-313.
  • Goring, Stuart P.; Rabaiotti, Joseph R.; Jones, Antonia J. (2007-09-01). "Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences". Computers & Security. 26 (6): 421–426. doi:10.1016/j.cose.2007.05.003. ISSN 0167-4048.

ed.ac.uk (Global: 1,871st place; English: 1,234th place)

inf.ed.ac.uk

epfl.ch (Global: 4,521st place; English: 4,877th place)

infoscience.epfl.ch

geeksforgeeks.org (Global: low place; English: low place)

hakin9.org (Global: low place; English: low place)

  • Hameiri, Paz (2019). "Body Keylogging". Hakin9 IT Security Magazine. 14 (7): 79–94.

handle.net (Global: 102nd place; English: 76th place)

hdl.handle.net

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. Bibcode:2014ITMC...13.2566N. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.

ingentaconnect.com (Global: 3,306th place; English: 3,189th place)

inquirer.net (Global: 437th place; English: 260th place)

technology.inquirer.net

ivizsecurity.com (Global: low place; English: low place)

keylogger.org (Global: low place; English: low place)

krebsonsecurity.com (Global: low place; English: low place)

microsoft.com (Global: 153rd place; English: 151st place)

msdn.microsoft.com

networkintercept.com (Global: low place; English: low place)

nsa.gov (Global: 7,043rd place; English: 4,687th place)

oxforddictionaries.com (Global: 710th place; English: 648th place)

pctools.com (Global: low place; English: low place)

pcworld.com (Global: 1,317th place; English: 873rd place)

privateinternetaccess.com (Global: low place; English: low place)

psu.edu (Global: 207th place; English: 136th place)

citeseerx.ist.psu.edu

qccglobal.com (Global: low place; English: low place)

sandboxie-plus.com (Global: low place; English: low place)

sciencedirect.com (Global: 149th place; English: 178th place)

securelist.com (Global: low place; English: low place)

securitydigest.org (Global: low place; English: low place)

securitysupervisor.com (Global: low place; English: low place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. Bibcode:2014ITMC...13.2566N. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). "A Systematic Review of Encryption and Keylogging for Computer System Security". 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT). IEEE. pp. 157–163. doi:10.1109/CCiCT56684.2022.00039. ISBN 978-1-6654-7224-1. S2CID 252849669.
  • Young, Adam; Yung, Moti (1997). "Deniable password snatching: On the possibility of evasive electronic espionage". Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097). pp. 224–235. doi:10.1109/SECPRI.1997.601339. ISBN 978-0-8186-7828-8. S2CID 14768587.
  • Young, Adam; Yung, Moti (1996). "Cryptovirology: Extortion-based security threats and countermeasures". Proceedings 1996 IEEE Symposium on Security and Privacy. pp. 129–140. CiteSeerX 10.1.1.44.9122. doi:10.1109/SECPRI.1996.502676. ISBN 978-0-8186-7417-4. S2CID 12179472.

snopes.com (Global: 944th place; English: 678th place)

  • "ATM camera". www.snopes.com. 19 January 2004. Retrieved 2009-04-19.

spyreveal.com (Global: low place; English: low place)

spyrix.com (Global: low place; English: low place)

spywareloop.com (Global: low place; English: low place)

symantec.com (Global: 9,107th place; English: 6,668th place)

syssec-project.eu (Global: low place; English: low place)

themoscownews.com (Global: low place; English: low place)

theregister.co.uk (Global: 1,216th place; English: 797th place)

threatpost.com (Global: low place; English: low place)

ucsd.edu (Global: 1,933rd place; English: 1,342nd place)

cseweb.ucsd.edu

usenix.org (Global: 5,990th place; English: 3,752nd place)

web.archive.org (Global: 1st place; English: 1st place)

windowssecrets.com (Global: low place; English: low place)

wired.com (Global: 193rd place; English: 152nd place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

  • Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–2579. Bibcode:2014ITMC...13.2566N. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
  • Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early prediction of writing quality using keystroke logging". International Journal of Artificial Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. hdl:10067/1801420151162165141. ISSN 1560-4292. S2CID 238703970.
  • Goring, Stuart P.; Rabaiotti, Joseph R.; Jones, Antonia J. (2007-09-01). "Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences". Computers & Security. 26 (6): 421–426. doi:10.1016/j.cose.2007.05.003. ISSN 0167-4048.

zdnet.com (Global: 786th place; English: 558th place)