Keylogger Detection Using a Decoy Keyboard

Seth Simms, Margot Maxwell, Sara Johnson, Julian L. Rrushi. Keylogger Detection Using a Decoy Keyboard. In Giovanni Livraga, Sencun Zhu, editors, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings. Volume 10359 of Lecture Notes in Computer Science, pages 433-452, Springer, 2017. [doi]

@inproceedings{SimmsMJR17,
  title = {Keylogger Detection Using a Decoy Keyboard},
  author = {Seth Simms and Margot Maxwell and Sara Johnson and Julian L. Rrushi},
  year = {2017},
  doi = {10.1007/978-3-319-61176-1_24},
  url = {https://doi.org/10.1007/978-3-319-61176-1_24},
  researchr = {https://researchr.org/publication/SimmsMJR17},
  cites = {0},
  citedby = {0},
  pages = {433-452},
  booktitle = {Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings},
  editor = {Giovanni Livraga and Sencun Zhu},
  volume = {10359},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-61176-1},
}