{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:16Z","timestamp":1772063716354,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642155116","type":"print"},{"value":"9783642155123","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15512-3_11","type":"book-chapter","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T12:27:39Z","timestamp":1283257659000},"page":"198-217","source":"Crossref","is-referenced-by-count":23,"title":["Bait Your Hook: A Novel Detection Technique for Keyloggers"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Ortolani","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Al-Hammadi, Y., Aickelin, U.: Detecting bots based on keylogging activities. In: Proceedings of the Third International Conference on Availability, Reliability and Security, pp. 896\u2013902 (2008)","DOI":"10.1109\/ARES.2008.58"},{"issue":"4","key":"11_CR2","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1214\/ss\/1177009870","volume":"10","author":"J. Aldrich","year":"1995","unstructured":"Aldrich, J.: Correlations genuine and spurious in pearson and yule. Statistical Science\u00a010(4), 364\u2013376 (1995)","journal-title":"Statistical Science"},{"key":"11_CR3","unstructured":"Aslam, M., Idrees, R., Baig, M., Arshad, M.: Anti-Hook Shield against the Software Key Loggers. In: Proceedings of the 2004 National Conference on Emerging Technologies, p. 189 (2004)"},{"key":"11_CR4","unstructured":"BAPCO: SYSmark 2004 SE (2004), http:\/\/www.bapco.com\/products\/sysmark2004se\/"},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TASL.2008.919072","volume":"16","author":"J. Benesty","year":"2008","unstructured":"Benesty, J., Chen, J., Huang, Y.: On the importance of the pearson correlation coefficient in noise reduction. IEEE Transactions on Audio, Speech, and Language Processing\u00a016(4), 757\u2013765 (2008)","journal-title":"IEEE Transactions on Audio, Speech, and Language Processing"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware (short paper). In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 76\u201385 (2006)","DOI":"10.1109\/SP.2006.37"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-0-387-68768-1_4","volume":"36","author":"D. Brumley","year":"2008","unstructured":"Brumley, D., Hartwig, C., Liang, Z., Newsome, J., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. Advances in Information Security\u00a036, 65\u201388 (2008)","journal-title":"Advances in Information Security"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"249","DOI":"10.3200\/JEXE.74.3.249-266","volume":"74","author":"L. Goodwin","year":"2006","unstructured":"Goodwin, L., Leech, N.: Understanding correlation: Factors that affect the size of r. The Journal of Experimental Education\u00a074(3), 249\u2013266 (2006)","journal-title":"The Journal of Experimental Education"},{"key":"11_CR9","unstructured":"Grebennikov, N.: Keyloggers: How they work and how to detect them, http:\/\/www.viruslist.com\/en\/analysis?pubid=204791931"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Han, J., Kwon, J., Lee, H.: Honeyid: Unveiling hidden spywares by generating bogus events. In: Proceedings of The Ifip Tc 11 23rd International Information Security Conference, pp. 669\u2013673 (2008)","DOI":"10.1007\/978-0-387-09699-5_43"},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1147\/sj.422.0347","volume":"42","author":"W. Hsu","year":"2003","unstructured":"Hsu, W., Smith, A.: Characteristics of I\/O traffic in personal computer and server workloads. IBM System Journal\u00a042(2), 347\u2013372 (2003)","journal-title":"IBM System Journal"},{"key":"11_CR12","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detection. In: Proceedings of the 15th USENIX Security Symposium (USENIX Security 2006) (2006)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1142\/S0219622002000026","volume":"1","author":"G. Kochenberger","year":"2002","unstructured":"Kochenberger, G., Glover, F., Alidaee, B.: An effective approach for solving the binary assignment problem with side constraints. Internation Journal of Information Technology and Decision Making\u00a01, 121\u2013129 (2002)","journal-title":"Internation Journal of Information Technology and Decision Making"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"H.W. Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The hungarian method for the assignment problem. Naval Research Logistics Quarterly\u00a02, 83\u201397 (1955)","journal-title":"Naval Research Logistics Quarterly"},{"key":"11_CR15","unstructured":"Security Technology Ltd.: Testing and reviews of keyloggers, monitoring products and spy software (spyware) (2009), http:\/\/www.keylogger.org\/monitoring-free-software-review\/"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proceeding of the 28th IEEE Symposium on Security and Privacy (SP 2007), pp. 231\u2013245 (May 2007)","DOI":"10.1109\/SP.2007.17"},{"key":"11_CR17","unstructured":"San Jose Mercury News: Kinkois spyware case highlights risk of public internet terminals (2009), http:\/\/www.siliconvalley.com\/mld\/siliconvalley\/news\/6359407.htm"},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/2685263","volume":"42","author":"J.L. Rodgers","year":"1988","unstructured":"Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. The American Statistician\u00a042(1), 59\u201366 (1988)","journal-title":"The American Statistician"},{"key":"11_CR19","unstructured":"Strahija, N.: Student charged after college computers hacked (2003), http:\/\/www.xatrix.org\/article2641.html"},{"key":"11_CR20","unstructured":"Xu, M., Salami, B., Obimbo, C.: How to protect personal information against keyloggers. In: Proceedings of the 9th International Conference on Internet and Multimedia Systems and Applications, IASTED 2005 (2005)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15512-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:09:17Z","timestamp":1606187357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15512-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155116","9783642155123"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15512-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}