메뉴 건너뛰기




Volumn , Issue , 2005, Pages 373-382

Keyboard acoustic emanations revisited

Author keywords

Acoustic Emanations; Cepstrum; Computer Security; Electronic Eavesdropping; Hidden Markov models; HMM; Human Factors; Keyboards; Learning Theory; Privacy; Signal Analysis

Indexed keywords

ACOUSTIC EMANATIONS; CEPSTRUM; ELECTRONIC EAVESDROPPING; HIDDEN MARKOV MODELS; LEARNING THEORY; SIGNAL ANALYSIS;

EID: 33745778686     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102169     Document Type: Conference Paper
Times cited : (122)

References (15)
  • 6
    • 0032119668 scopus 로고    scopus 로고
    • The hierarchical hidden Markov model: Analysis and applications
    • FINE, S., SINGER, Y., AND TISHBY, N. "The Hierarchical Hidden Markov Model: Analysis and Applications". Machine Learning 32, 1 (1998), 41-62.
    • (1998) Machine Learning , vol.32 , Issue.1 , pp. 41-62
    • Fine, S.1    Singer, Y.2    Tishby, N.3
  • 10
    • 3543134500 scopus 로고    scopus 로고
    • Compromising emanations: Eavesdropping risks of of computer displays
    • Computer Laboratory, University of Cambridge
    • KUHN, M. G. "Compromising Emanations: Eavesdropping Risks of of Computer Displays". Technical Report UCAM-CL-TR-577, Computer Laboratory, University of Cambridge, 2003.
    • (2003) Technical Report UCAM-CL-TR-577
    • Kuhn, M.G.1
  • 13
    • 84873975005 scopus 로고    scopus 로고
    • SPEECH VISION AND ROBOTICS GROUP OF THE CAMBRIDGE UNIVERSITY ENGINEERING DEPARTMENT. HTK Speech Recognition Toolkit, http://htk.eng.cam.ac.uk/.
    • HTK Speech Recognition Toolkit


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.