1. J. Fu, Y. Liang, C. Tan, X. Xiong, Detecting software key loggers with the dendritic cell algorithm, in International Conference on Communications and Mobile Computing (2010)
2. M. Raza, M. Iqbal, M. Sharif, W. Haider, A survey of password attacks and comparative analysis on methods for secure authentication. World Appl. Sci. J. (Jan 2012)
3. M. Aslam, R.N. Idrees, M.M. Baig, M.A. Arshad, Anti-hook shield against the software key loggers, in National Conference on Emerging Technologies (2004)
4. A. Solairaj, S.C. Prabanand, J. Mathalairaj, C. Prathap, L.S. Vignesh, Key Loggers Software Detection Techniques (2016)
5. Y.A. Ahmed, M.A. Maarof, F.M. Hassan, M. Muse, Survey of key logger technologies (Feb 2014)