Author:
Ortolani Stefano,Giuffrida Cristiano,Crispo Bruno
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Al-Hammadi, Y., Aickelin, U.: Detecting bots based on keylogging activities. In: Proceedings of the Third International Conference on Availability, Reliability and Security, pp. 896–902 (2008)
2. Aldrich, J.: Correlations genuine and spurious in pearson and yule. Statistical Science 10(4), 364–376 (1995)
3. Aslam, M., Idrees, R., Baig, M., Arshad, M.: Anti-Hook Shield against the Software Key Loggers. In: Proceedings of the 2004 National Conference on Emerging Technologies, p. 189 (2004)
4. BAPCO: SYSmark 2004 SE (2004), http://www.bapco.com/products/sysmark2004se/
5. Benesty, J., Chen, J., Huang, Y.: On the importance of the pearson correlation coefficient in noise reduction. IEEE Transactions on Audio, Speech, and Language Processing 16(4), 757–765 (2008)
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AirKeyLogger: Hardwareless Air-Gap Keylogging Attack;2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC);2023-06
2. Keylogger Detection: A Systematic Review;2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG);2023-04-05
3. Simulating Cyber Attacks and Designing Malware using Python;2023 10th International Conference on Signal Processing and Integrated Networks (SPIN);2023-03-23
4. Design, Analysis and Implementation of an Advanced Keylogger to Defend Cyber Threats;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
5. ULTRA: Ultimate Rootkit Detection over the Air;25th International Symposium on Research in Attacks, Intrusions and Defenses;2022-10-26