2013
DOI: 10.1007/978-3-642-40576-1_26
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and Embellishment of Prevention of Keylogger Spyware Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Furthermore, Detection methodology is also among the aspect of classification which Regarding the detection method of [1,3], IDS uses the misuse detection (signature) and anomaly (behavior) detection. Misuse detection uses the pre-definition of known attacks like a knowledge base of signatures to define the possible suspicious events such as [78]. Therefore, anomaly detection has been used a statistical and machine learning pattern to build a classifier model which is used to discover the normal and abnormal behavior.…”
Section: Typementioning
confidence: 99%
“…Furthermore, Detection methodology is also among the aspect of classification which Regarding the detection method of [1,3], IDS uses the misuse detection (signature) and anomaly (behavior) detection. Misuse detection uses the pre-definition of known attacks like a knowledge base of signatures to define the possible suspicious events such as [78]. Therefore, anomaly detection has been used a statistical and machine learning pattern to build a classifier model which is used to discover the normal and abnormal behavior.…”
Section: Typementioning
confidence: 99%