Keyboard acoustic emanations
暂无分享,去创建一个
[1] Niels Mache,et al. Recent developments of the SNNS neural network simulator , 1991 .
[2] William J. J. Roberts,et al. Genetically optimised feedforward neural networks for speaker identification , 2000, KES'2000. Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies. Proceedings (Cat. No.00TH8516).
[3] Markus G. Kuhn,et al. Soft Tempest { An Opportunity for NATO , 1999 .
[4] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[5] Jonathan T. Trostle,et al. Timing attacks against trusted path , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6] V. Rich. Personal communication , 1989, Nature.
[7] Markus G. Kuhn,et al. Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.
[8] Steven W. Smith,et al. The Scientist and Engineer's Guide to Digital Signal Processing , 1997 .
[9] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[10] Markus G. Kuhn,et al. Optical time-domain eavesdropping risks of CRT displays , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[11] Paul Greengrass,et al. Spycatcher , 1988 .
[12] David A. Umphress,et al. Information leakage from optical emanations , 2002, TSEC.