An in-depth analysis of the epitome of online stealth: Keyloggers
dc.contributor.author | Vishnani, K. | |
dc.contributor.author | Pais, A.R. | |
dc.contributor.author | Mohandas, R. | |
dc.date.accessioned | 2020-03-30T09:58:49Z | |
dc.date.available | 2020-03-30T09:58:49Z | |
dc.date.issued | and their countermeasures | |
dc.description.abstract | 10.1007/978-3-642-22720-2_2 | en_US |
dc.identifier.citation | 2011 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/7316 | |
dc.title | An in-depth analysis of the epitome of online stealth: Keyloggers | en_US |
dc.type | Book chapter | en_US |