Keylogger Detection Using a Decoy Keyboard

Co-Author(s)

Simms, Seth

Research Mentor(s)

Rrushi, Julian

Description

Keylogger Detection Using a Decoy Keyboard

Document Type

Event

Start Date

17-5-2017 9:00 AM

End Date

17-5-2017 12:00 PM

Department

Computer Science

Genre/Form

student projects; posters

Subjects – Topical (LCSH)

Hacking; Computer networks--Security measures; Computer security

Type

Image

Comments

This material is based on research sponsored by U.S. Air Force Academy under agreement number FA7000-16-2-0002. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.

Rights

Copying of this document in whole or in part is allowable only for scholarly purposes. It is understood, however, that any copying or publication of this documentation for commercial purposes, or for financial gain, shall not be allowed without the author's written permission.

Language

English

Format

application/pdf

This document is currently not available here.

Share

COinS
 
May 17th, 9:00 AM May 17th, 12:00 PM

Keylogger Detection Using a Decoy Keyboard

Keylogger Detection Using a Decoy Keyboard