1. User Activity Monitoring Using Keylogger;venkatesh;Asia Journal of Information Technology,2015
2. Real Time Working of Keylogger Malware Analysis;kataria;International Journal of Engineering Research & Technology (IJERT),2020
3. Cyber Security-KEYLOGGERSComparison of Detection Techniques & Its Legitimate Use;gorecha;International Journal of Engineering Research & Technology,0
4. How computer keyboards work;wilson;Howstuffworks com,2008