1. Rajendra RK, CA Wood (2010) Keylogger in Cybersecurtiy Education. Rechester Institute of Technology, Rechester, New York, USA
2. Olzak T (2008) Keystroke Logging Keylogging Erudio Security, LLC
3. Ysterud SA (2014) Keylogging of user interaction in physical and virtual environments and its implications for honeypot analysis
4. Ahmed YA, Maarof MA, Hassan FM, Abshir MM (2014) Computer Science, Faculty of Computer Science & Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia
5. Davis A (2007) Hardware keylogger Detection. Smith Square London