Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 23
Page No. 4758 - 4762

User Activity Monitoring Using Keylogger

Authors : R. Venkatesh and K. Raja Sekhar

References

Christopher A.W. and K.R. Rajendra, 2010. Keyloggers in cybersecurity education. Proceedings of the 2010 International Conference on Security and Management SAM, July 12-15, 2010, Las Vegas Nevada, USA,, New York, USA, ISBN 1-60132-163-5, pp: 644-650.

Mell, P., K. Kent and J. Nusbaum, 2005. Guide to malware incident prevention and handling. National Institute of Standards and Technology, Gaithersburg, Maryland.

Sagiroglu, S. and G. Canbek, 2009. Keyloggers. IEEE. Technol. Soc. Mag., 28: 10-17.
CrossRef  |  Direct Link  |  

Tuli, P. and P. Sahu, 2013. System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput., 2: 106-111.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved