A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them
暂无分享,去创建一个
Michael Goldsmith | Samy Meftali | Jassim Happa | Hugo Sbai | J. Happa | S. Meftali | M. Goldsmith | Hugo Sbai
[1] Ryan M. Gerdes,et al. Physical-Layer Detection of Hardware Keyloggers , 2015, RAID.
[2] Soumya K. Ghosh,et al. Optical Character Recognition Systems , 2017 .
[3] Ajinkya Pawar,et al. Secure Authentication using Anti-Screenshot Virtual Keyboard , 2011 .
[4] M. Nasipuri,et al. Text line extraction from handwritten document pages using spiral run length smearing algorithm , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).
[5] Abdel Belaïd,et al. Impact of features and classifiers combinations on the performances of Arabic recognition systems , 2017, 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR).
[6] Sonal Chawla,et al. Image Compression Techniques: A Review , 2014 .
[7] Puneet Verma,et al. Designing of Licensed Number Plate Recognition system using hybrid technique from neural network & template matching , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).
[8] Mayank Agarwal,et al. Secure authentication using dynamic virtual keyboard layout , 2011, ICWET.
[9] Ahmad Abdulkader,et al. Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment , 2009, 2009 10th International Conference on Document Analysis and Recognition.
[10] Johnny Lim. Defeat spyware with anti-screen capture technology using visual persistence , 2007, SOUPS '07.
[11] Ming-Wen Chang,et al. Optical chinese character recognition with a hidden Markov model classifier—a novel approach , 1990 .
[12] Alekha Kumar Mishra,et al. Optical character recognition using artificial neural network , 2017, 2017 International Conference on Computer Communication and Informatics (ICCCI).
[13] Edison A. Roxas,et al. Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine , 2015, 2015 International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM).
[14] Tong Lu,et al. Character Segmentation and Recognition , 2014 .
[15] Samer El-Sawda,et al. Phishing attacks and solutions , 2007, Mobimedia 2007.
[16] Gilles Grimaud,et al. Virtual Keyboard Logging Counter-Measures Using Human Vision Properties , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[17] Georgios Kambourakis,et al. From keyloggers to touchloggers: Take the rough with the smooth , 2013, Comput. Secur..