{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:20:40Z","timestamp":1725992440824},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_2","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T11:22:22Z","timestamp":1537615342000},"page":"18-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them"],"prefix":"10.1007","author":[{"given":"Hugo","family":"Sbai","sequence":"first","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Samy","family":"Meftali","sequence":"additional","affiliation":[]},{"given":"Jassim","family":"Happa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349\u2013516, vol. 2, February 2011","DOI":"10.1145\/1980022.1980087"},{"issue":"5","key":"2_CR2","first-page":"3","volume":"8","author":"A Parekh","year":"2011","unstructured":"Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. Int. J. Comput. Sci. Issues 8(5), 3 (2011)","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Abdulkader, A., Casey, M. R.: Low cost correction of OCR errors using learning in a multi-engine environment. In: 2009 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 576\u2013580 (2009)","DOI":"10.1109\/ICDAR.2009.242"},{"key":"2_CR4","unstructured":"Bakhtiyari, S., Tahir, U.: Phishing attacks and solutions (2010)"},{"key":"2_CR5","unstructured":"Cengage Learning: Malware and Social Engineering Attacks, Chap. 2 (2011)"},{"issue":"3","key":"2_CR6","first-page":"656","volume":"5","author":"M Dadkhah","year":"2014","unstructured":"Dadkhah, M., Jazi, M.D.: Secure payment in E-commerce : deal with keyloggers and phishings. Int. J. Electron. Commun. Comput. Eng. 5(3), 656\u2013660 (2014)","journal-title":"Int. J. Electron. Commun. Comput. Eng."},{"key":"2_CR7","unstructured":"Dheeraj Bansal (2014). https:\/\/www.shoutmeloud.com\/online-virtual-keyboard-secure-passwords-from-keyloggers.html"},{"key":"2_CR8","unstructured":"Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate\u2019s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17\u201320 July 2017"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-26362-5_2","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"RM Gerdes","year":"2015","unstructured":"Gerdes, R.M., Mallick, S.: Physical-layer detection of hardware keyloggers. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 26\u201347. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_2"},{"key":"2_CR10","unstructured":"Guerra, E.: Keyloggers: A Threat to Your Data (2011)"},{"key":"2_CR11","unstructured":"Grebennikov, N.: March 2007. https:\/\/securelist.com\/keyloggers-how-they-work-and-how-to-detect-them-part-1\/36138\/"},{"key":"2_CR12","unstructured":"Pathak, N., Pawar, A., Patil, B.: A survey on Keyloggers: a malicious Attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 4(4) (2015)"},{"key":"2_CR13","unstructured":"Olzak, T.: Keystroke logging (keylogging), April 2008"},{"key":"2_CR14","unstructured":"Lopez, W., Guerra, H., Pena, E., Barrera, E., Sayol, J.: Keyloggers - Ethical Hacking (2014)"},{"issue":"3","key":"2_CR15","first-page":"57","volume":"15","author":"N Kaur","year":"2015","unstructured":"Kaur, N.: A survey on online banking system attacks and its countermeasures. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(3), 57 (2015)","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"2_CR16","unstructured":"Ollmann, G.: The phishing guide understanding and preventing phishing attacks (2014)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, 147\u2013148. ACM, New York (2007)","DOI":"10.1145\/1280680.1280701"},{"key":"2_CR18","unstructured":"Roche, M.: Wireless hacking tools (2007)"},{"key":"2_CR19","unstructured":"Magazine Numerique XMCO: Cybercriminalite keylogger botnet attaques (2011)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Echi, A.K., Belaid, A.: Impact of features and classifiers combinations on the performances of Arabic recognition systems. In: 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR), pp. 85\u201389 (2017)","DOI":"10.1109\/ASAR.2017.8067765"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Bautista, R.M.J.S., Navata, V.J.L., Ng, A.H., Santos, M.T.S., Albao, J.D., Roxas, E.A.: Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine. In: 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Cebu City, pp. 1\u20136 (2015)","DOI":"10.1109\/HNICEM.2015.7393256"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Das, T.K., Tripathy, A.K., Mishra, A.K.: Optical character recognition using artificial neural network. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1\u20134 (2017)","DOI":"10.1109\/ICCCI.2017.8117703"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, B.B., Bansal, M., Verma, P.: Designing of licensed number plate recognition system using hybrid technique from neural network template matching. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1\u20136 (2015)","DOI":"10.1109\/CCCS.2015.7374170"},{"key":"2_CR24","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-1-4471-6515-6_6","volume-title":"Video Text Detection","author":"T Lu","year":"2014","unstructured":"Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W.: Character segmentation and recognition. In: Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W., et al. (eds.) Video Text Detection. ACVPR, pp. 145\u2013168. Springer, London (2014). https:\/\/doi.org\/10.1007\/978-1-4471-6515-6_6"},{"key":"2_CR25","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-319-50252-6_2","volume-title":"Optical Character Recognition Systems for Different Languages with Soft Computing","author":"A Chaudhuri","year":"2017","unstructured":"Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K.: Optical character recognition systems. In: Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K. (eds.) Optical Character Recognition Systems for Different Languages with Soft Computing. STUDFUZZ, vol. 352, pp. 9\u201341. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50252-6_2"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.269"},{"issue":"18","key":"2_CR27","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1049\/el:19900982","volume":"26","author":"BS Jeng","year":"1990","unstructured":"Jeng, B.S., Chang, M.W., Sun, S.W., Shih, C.H., Wu, T.M.: Optical Chinese character recognition with a hidden Markov model classifier-a novel approach. Electron. Lett. 26(18), 1530\u20131531 (1990)","journal-title":"Electron. Lett."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Malakar, S., Halder, S., Sarkar, R., Das, N., Basu, S., Nasipuri, M.: Text line extraction from handwritten document pages using spiral run length smearing algorithm. In: 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 616\u2013619 (2012)","DOI":"10.1109\/CODIS.2012.6422278"},{"key":"2_CR29","first-page":"25","volume":"5","author":"A Yahye","year":"2014","unstructured":"Yahye, A., Mohd, M., Fuad, H., Mohamed, M.A.: Survey of keylogger technologies. Int. J. Comput. Sci. Telecommun. 5, 25\u201331 (2014)","journal-title":"Int. J. Comput. Sci. Telecommun."},{"key":"2_CR30","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2012.10.002","volume":"32","author":"D Damopoulos","year":"2013","unstructured":"Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102\u2013114 (2013)","journal-title":"Comput. Secur."},{"issue":"3","key":"2_CR31","first-page":"106","volume":"2","author":"P Tuli","year":"2013","unstructured":"Tuli, P., Sahu, P.: System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput. IJCSMC 2(3), 106\u2013111 (2013)","journal-title":"Int. J. Comput. Sci. Mob. Comput. IJCSMC"},{"issue":"8","key":"2_CR32","first-page":"291","volume":"3","author":"S Chawla","year":"2014","unstructured":"Chawla, S., Beri, M., Mudgi, R.: Image compression techniques: a review. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(8), 291\u2013296 (2014)","journal-title":"Int. J. Comput. Sci. Mob. Comput. IJCSMC"},{"key":"2_CR33","unstructured":"Sharma, P., Mahajan, R.: A review on compression techniques with run length encoding. Int. J. Appl. Innov. Eng. Manage. (IJAIEM). 2(8), (2013)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T17:05:44Z","timestamp":1571936744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}