{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:16Z","timestamp":1772063716692,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642405754","type":"print"},{"value":"9783642405761","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40576-1_26","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T10:17:03Z","timestamp":1376475423000},"page":"262-271","source":"Crossref","is-referenced-by-count":6,"title":["Implementation and Embellishment of Prevention of Keylogger Spyware Attacks"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Wazid","sequence":"first","affiliation":[]},{"given":"Robin","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Avita","family":"Katal","sequence":"additional","affiliation":[]},{"given":"R. H.","family":"Goudar","sequence":"additional","affiliation":[]},{"given":"Priyanka","family":"Bhakuni","sequence":"additional","affiliation":[]},{"given":"Asit","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Mohammad, W., Robin, S., Avita, K., Goudar, R.H., Singh, D.P., Bhakuni, P., Tyagi, A.: A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks. In: Proceedings of 7th International Conference on Intelligent Systems and Control (2013)"},{"key":"26_CR2","unstructured":"Zhen, J., Liu, Z.: New honeypot system and its application in security of employment network. In: IEEE Symposium on Robotics and Applications (2012)"},{"key":"26_CR3","unstructured":"Liu, D., Zhang, Y.: An Intrusion Detection System Based on Honeypot Technology. In: ACM International Conference on Computer Science and Electronics Engineering (2012)"},{"key":"26_CR4","unstructured":"Sanjeev, K., Rakesh, S.: Bhatia J. S.: Hybrid Honeypot Framework for Malware Collection and analysis. In: 7th IEEE International Conference on Industrial and Information Systems (2012)"},{"key":"26_CR5","unstructured":"David, M., Rajeev, A.: A study of Methodologies used in Intrusion Detection and Prevention Systems (IDPS). In: Proceedings of IEEE Southeastcon (2012)"},{"key":"26_CR6","unstructured":"Yun, Y., Jia, M.: Design and implementation of distributed intrusion detection system based on honeypot. In: 2nd IEEE International Conference on Computer Engineering and Technology (2010)"},{"key":"26_CR7","unstructured":"Mohamed, N., Radu, S., Olivier, F.: VoIP Malware: Attack Tool & Attack Scenarios. In: IEEE International Conference on Communications (2009)"},{"key":"26_CR8","unstructured":"Li, S., Roland, S.: A Novel Anti-Phishing Framework Based on Honeypots. IEEE eCrime Researchers Summit (2009)"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Yao, Y., Lv, J.-W., Gao, F.-X., Yu, G., Deng, Q.-X.: Detecting and Defending against Worm Attacks Using Bot-honeynet. In: 2nd IEEE International Symposium on Electronic Commerce and Security (2009)","DOI":"10.1109\/ISECS.2009.185"},{"issue":"4","key":"26_CR10","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2006.02.009","volume":"25","author":"A. Hassan","year":"2006","unstructured":"Hassan, A., Haider, S., Malek, S., Iyad, K., Zaid, A.M.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Elsevier Journal of Computers & Security\u00a025(4), 274\u2013288 (2006)","journal-title":"Elsevier Journal of Computers & Security"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40576-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T15:29:57Z","timestamp":1558020597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40576-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405754","9783642405761"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40576-1_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}