Types of Keyloggers Technologies – Survey

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Keyloggers are rootkit malware that record the keystrokes of the victim’s system and log it into the attacker’s system. It can be used to capture sensitive data like passwords, PINs, usernames, some kind of confidential messages shared between two entities etc. We would be explaining different types of keyloggers and their working. We have also explained the different applications and measures needed to avoid keylogging activities on your system.

Cite

CITATION STYLE

APA

Tuscano, A., & Koshy, T. S. (2021). Types of Keyloggers Technologies – Survey. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 11–22). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free