Author:
Adhikary Nairit,Shrivastava Rohit,Kumar Ashwani,Verma Sunil Kumar,Bag Monark,Singh Vrijendra
Subject
Applied Mathematics,Computer Networks and Communications,Computer Science Applications,Safety Research,Information Systems,Software
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Systematic Review of Social Engineering Attacks & Techniques: The Past, Present, and Future;2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG);2024-04-02
2. Design, Analysis and Implementation of an Advanced Keylogger to Defend Cyber Threats;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
3. Keylogger Awareness and Use in Cyber Forensics;Rising Threats in Expert Applications and Solutions;2022
4. Keystroke Capture;Encyclopedia of Big Data;2022
5. A Comprehensive Survey of Phishing Email Detection and Protection Techniques;Information Security Journal: A Global Perspective;2021-09-15