A Robust Technique of Anti Key-Logging using Key-Logging Mechanism
暂无分享,去创建一个
[1] Aaron Weiss,et al. Spyware be gone! , 2005, NTWK.
[2] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[3] Lein Harn,et al. A software authentication system for the prevention of computer viruses , 1992, CSC '92.
[4] David R. Kaeli,et al. Characterizing antivirus workload execution , 2005, CARN.
[5] Doug Varney. Adequacy of checksum algorithms for computer virus detection , 1990, SIGSMALL '90.
[6] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[7] Alan D. Ross,et al. Network Security Essentials , 2003 .
[8] Muhammad Aslam,et al. Anti-Hook Shield against the Software Key Loggers , 2004 .
[9] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[10] Kevin Davis,et al. Saving users from themselves: creating an effective student-oriented anti-virus intervention , 2001, SIGUCCS '01.
[11] Abraham Silberschatz,et al. Operating System Concepts , 1983 .
[12] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..