Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Keyloggers

Mobile Health Applications for Quality Healthcare Delivery
Captures keystrokes on a compromised system and collecting sensitive information (e.g., names, passwords) for the attacker.
Published in Chapter:
Mathematical Models for Computer Virus: Computer Virus Epidemiology
Stelios Zimeras (University of the Aegean, Greece)
Copyright: © 2019 |Pages: 10
DOI: 10.4018/978-1-5225-8021-8.ch009
Abstract
Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the internet by various means such as file downloading, email, exploiting security holes in software, etc. In general, epidemic models assume that individuals go through a series of states at a certain constant set of rates. Different epidemic models have been proposed based on the characteristics of the systems and the topology of the network. In this chapter, an analysis of various epidemic models will be analyzed under differential mathematical systems.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber-Victimization
Malicious software (‘malware’) installed on victims computers to record keystrokes (including passwords and logins).
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Identity Theft
Malicious software (‘malware’) installed on victims computers to record keystrokes (including passwords and logins).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR