{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:26:19Z","timestamp":1725737179986},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/hpcc-css-icess.2015.269","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T21:52:33Z","timestamp":1448920353000},"page":"1230-1235","source":"Crossref","is-referenced-by-count":3,"title":["Virtual Keyboard Logging Counter-Measures Using Human Vision Properties"],"prefix":"10.1109","author":[{"given":"Christophe","family":"Bacara","sequence":"first","affiliation":[]},{"given":"Valentin","family":"Lefils","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Iguchi-Cartigny","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Grimaud","sequence":"additional","affiliation":[]},{"given":"Jean-Philippe","family":"Wary","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046618"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254209"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2007.371990"},{"key":"ref13","first-page":"656","article-title":"Secure payment in e-commerce: Deal with keyloggers and pishings","author":"dadkhah","year":"2014","journal-title":"International Journal of Electronics Communications and Computer Engineering (IJECCE)"},{"key":"ref14","first-page":"1320","article-title":"Design and implementation of anti-screenshot virtual keyboard applied in online banking","author":"shangfu","year":"2010","journal-title":"E-Business and E-Government (ICEE) 2010 International Conference"},{"key":"ref15","first-page":"37","article-title":"Designing leakage-resilient password entry on touchscreen mobile devices","author":"yan","year":"2013","journal-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280701"},{"key":"ref17","article-title":"You can type, but you cant hide: A stealthy gpu-based keylogger","author":"ladakis","year":"2013","journal-title":"Proceedings of European Workshop on System Security (EUROSEC"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70126-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(88)90013-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(91)90009-D"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04444-1_1","article-title":"Learning more about the underground economy: A case-study of keyloggers and dropzones","author":"holz","year":"2009","journal-title":"Computer Security - ESORICS 2009"},{"key":"ref1","first-page":"337","article-title":"Analysis of new threats to online banking authentication schemes","author":"delgado","year":"2008","journal-title":"Proceedings of the X Spanish Meeting on Cryptology and Information Security (RECSI 2008)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1053291.1053327"}],"event":{"name":"2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems","start":{"date-parts":[[2015,8,24]]},"location":"New York, NY","end":{"date-parts":[[2015,8,26]]}},"container-title":["2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7335977\/7336120\/07336336.pdf?arnumber=7336336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T04:20:07Z","timestamp":1555042807000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7336336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/hpcc-css-icess.2015.269","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}