Publisher
Springer International Publishing
Reference24 articles.
1. Al-Hammadi, Y., Aickelin, U.: Detecting bots based on keylogging activities. In: Proceeding of 3rd International Conference on Availability, Reliability and Security, pp. 896–902 (2008)
2. Aslam, M., Idrees, R., Baig, M., Arshad, M.: Anti-hook shield against the software keyloggers. In: Proceeding of the National Conference on Emerging Technologies, pp. 189–191 (2004)
3. Estrada, Z.J., Sprabery, R., Yan, L., Yu, Z., Campbell, R., Kalbarczyk, Z., Iyer, R.K.: Using OS design patterns to provide reliability and security as-a-service for VM-based clouds. In: Proceedings of the 2017 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 157–170 (2017)
4. Fangzhou, G., et al.: A novel detection technique for keyloggers. Lecture Notes in Computer Science, vol. 6307, pp. 198–217 (2010)
5. GithubGist: Bypass UAC via fodhelper binary in windows 10 systems. Technical Report. https://gist.github.com/netbiosX/a114f8822eb20b115e33db55deee6692
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献