{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:04:33Z","timestamp":1703027073695},"reference-count":16,"publisher":"International Academy Publishing (IAP)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.9.6.1347-1354","type":"journal-article","created":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T12:37:28Z","timestamp":1401626248000},"source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Keylogger Detection Performance of the Dendritic Cell Algorithm by an Enticement Strategy"],"prefix":"10.17706","volume":"9","author":[{"given":"Jun","family":"Fu","sequence":"first","affiliation":[]},{"given":"Huan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2014,6,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.6.895-907"},{"key":"ref2","first-page":"1","article-title":"Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones","volume-title":"Proc of 14th European Symposium on Research in Computer Security","author":"Holz","year":"2009","unstructured":"[2] T. Holz, M. Engelberth, and F. Freiling, \"Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones\", in Proc. of 14th European Symposium on Research in Computer Security, 2009, pp. 1\u201318."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2009.934159"},{"key":"ref4","first-page":"314","article-title":"A Robust Technique of Anti Key-Logging Using Key-Logging Mechanism","volume-title":"Proc of Digital EcoSystems and Technologies Conference","author":"Baig","year":"2007","unstructured":"[4] M. Baig and W. Mahmood, \"A Robust Technique of Anti Key-Logging Using Key-Logging Mechanism\", in Proc. of Digital EcoSystems and Technologies Conference, 2007, pp. 314\u2013318."},{"issue":"No. 8","key":"ref5","first-page":"1706","article-title":"Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection","volume":"7","author":"Luo","year":"2012","unstructured":"[5] W. Luo, N. Li, and Y. Tang, \"Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection\", Journal of Software, Vol. 7, No. 8, 2012, pp. 1706\u20131712.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref6","first-page":"189","article-title":"Anti-Hook Shield against the Software Key Loggers","volume-title":"Proc of the National Conference on Emerging Technologies","author":"Aslam","year":"2004","unstructured":"[6] M. Aslam, R. Idrees, M. Baig, and M. Arshad, \"Anti-Hook Shield against the Software Key Loggers\", in Proc. of the National Conference on Emerging Technologies, 2004, pp. 189\u2013191."},{"key":"ref7","first-page":"896","article-title":"Detecting Bots Based on Keylogging Activities","volume-title":"Proc of the 3rd International Conference on Availability Reliability and Security","author":"Al-Hammadi","year":"2008","unstructured":"[7] Y. Al-Hammadi and U. Aickelin, \"Detecting Bots Based on Keylogging Activities\", in Proc. of the 3rd International Conference on Availability, Reliability and Security, 2008, pp. 896\u2013902."},{"key":"ref8","first-page":"111","article-title":"Detecting Software Keyloggers with Dendritic Cell Algorithm","volume-title":"Proc of the International Conference on Communications and Mobile Computing","author":"Fu","year":"2010","unstructured":"[8] J. Fu, Y. Liang, C. Tan, and X. Xiong, \"Detecting Software Keyloggers with Dendritic Cell Algorithm\", in Proc. of the International Conference on Communications and Mobile Computing, 2010, pp. 111\u2013115."},{"key":"ref9","first-page":"220","article-title":"A Sense of 'Danger' for Windows Processes","volume-title":"Proc of the 8th International Conference of Arti\ufb01cial Immune System","author":"Manzoor","year":"2009","unstructured":"[9] S. Manzoor, M. Shafiq, S. Tabish, and M. Farooq, \"A Sense of 'Danger' for Windows Processes\", in Proc. of the 8th International Conference of Arti\ufb01cial Immune System, 2009, pp. 220\u2013233."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.10.2469-2477"},{"key":"ref11","first-page":"275","article-title":"How to Protect Personal Information against Keyloggers","volume-title":"Proc of the 9th International Conference on Internet and Multimedia Systems and Applications","author":"Xu","year":"2005","unstructured":"[11] M. Xu, B. Salami, and C. Obimbo, \"How to Protect Personal Information against Keyloggers\", in Proc. of the 9th International Conference on Internet and Multimedia Systems and Applications, 2005, pp. 275\u2013280."},{"key":"ref12","first-page":"651","article-title":"A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring","volume-title":"Proc of 14th International Conference on Network-Based Information Systems","author":"Nasaka","year":"2011","unstructured":"[12] K. Nasaka, T. Takami, T. Yamamoto, and M. Nishigaki, \"A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring\", in Proc. of 14th International Conference on Network-Based Information Systems, 2011, pp. 651\u2013656."},{"key":"ref13","volume-title":"Maths and Statistics for Accounting and Business Studies","author":"Bancroft","year":"1988","unstructured":"[13] G. Bancroft and G. O'Sullivan, Maths and Statistics for Accounting and Business Studies, 2nd ed., McGraw-Hill, 1988."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.04.006"},{"issue":"No. 8","key":"ref15","first-page":"2087","article-title":"Survey of DCA for Abnormal Detection","volume":"8","author":"Ding","year":"2013","unstructured":"[15] L. Ding, F. Yu, and Z. Yang, \"Survey of DCA for Abnormal Detection\", Journal of Software, Vol. 8, No. 8, 2013, pp. 2087\u20132094.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref16","first-page":"1","article-title":"How to Login from an Internet Cafe without Worrying about Keyloggers","volume-title":"Proc of Symposium on Usable Privacy and Security","volume":"6","author":"Herley","year":"2006","unstructured":"[16] C. Herley and D. Florencio, \"How to Login from an Internet Cafe without Worrying about Keyloggers\", in Proc. of Symposium on Usable Privacy and Security, Vol. 6, 2006, pp. 1\u20132."}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:16:22Z","timestamp":1442315782000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/12720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,1]]},"references-count":16,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.9.6.1347-1354","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2014,6,1]]}}}