{"id":"https://openalex.org/W4232133760","doi":"https://doi.org/10.1007/978-1-4419-5906-5_782","title":"Keylogging","display_name":"Keylogging","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W4232133760","doi":"https://doi.org/10.1007/978-1-4419-5906-5_782"},"language":"en","primary_location":{"id":"doi:10.1007/978-1-4419-5906-5_782","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-1-4419-5906-5_782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Encyclopedia of Cryptography and Security","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091397700","display_name":"Aaron Estes","orcid":"https://orcid.org/0000-0002-4558-5909"},"institutions":[{"id":"https://openalex.org/I178169726","display_name":"Southern Methodist University","ror":"https://ror.org/042tdr378","country_code":"US","type":"education","lineage":["https://openalex.org/I178169726"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aaron Estes","raw_affiliation_strings":["Department of Computer Science and Engineering, Lyle School of Engineering Southern Methodist University, Dallas, USA","Department of Computer Science and Engineering, Lyle School of Engineering Southern Methodist University, PO Box 750339, 75275-0339, Dallas, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Lyle School of Engineering Southern Methodist University, Dallas, USA","institution_ids":["https://openalex.org/I178169726"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Lyle School of Engineering Southern Methodist University, PO Box 750339, 75275-0339, Dallas, TX, USA","institution_ids":["https://openalex.org/I178169726"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091397700"],"corresponding_institution_ids":["https://openalex.org/I178169726"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32316002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"691","last_page":"691"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.26901552081108093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.26901552081108093}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-1-4419-5906-5_782","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-1-4419-5906-5_782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Encyclopedia of Cryptography and Security","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2168770225"],"related_works":["https://openalex.org/W11016543","https://openalex.org/W2882144","https://openalex.org/W6008397","https://openalex.org/W972044","https://openalex.org/W1802230","https://openalex.org/W5574817","https://openalex.org/W12544054","https://openalex.org/W563404","https://openalex.org/W5281039","https://openalex.org/W5963666"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2022-05-12T00:00:00"}
