Keyboard acoustic emanations, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.3-11, 2004. ,
DOI : 10.1109/SECPRI.2004.1301311
Time-Delay Estimation via Linear Interpolation and Cross Correlation, IEEE Transactions on Speech and Audio Processing, vol.12, issue.5, pp.509-519, 2004. ,
DOI : 10.1109/TSA.2004.833008
Average word length dynamics as indicator of cultural changes in society. arXiv preprint arXiv:1208, p.6109, 2012. ,
Class-based ngram models of natural language, Computational linguistics, vol.18, issue.4, pp.467-479, 1992. ,
Mobile phones as computing devices: the viruses are coming! Pervasive Computing, pp.11-15, 2004. ,
DOI : 10.1109/mprv.2004.21
Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing, IEEE Transactions on Information Forensics and Security, vol.8, issue.3, pp.563-577, 2013. ,
DOI : 10.1109/TIFS.2013.2247758
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks, Pervasive and Mobile Computing, vol.25, pp.1-25, 2015. ,
DOI : 10.1016/j.pmcj.2015.12.001
When Good Becomes Evil, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1273-1285, 2015. ,
DOI : 10.1145/2660267.2660296
Charging Me and I Know Your Secrets!, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS '15, pp.89-98, 2015. ,
DOI : 10.1145/1609956.1609959
Tapprints, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.323-336, 2012. ,
DOI : 10.1145/2307636.2307666
TextLogger, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, pp.1-12, 2015. ,
DOI : 10.1145/2046707.2046771
Context-free Attacks Using Keyboard Acoustic Emanations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.453-464, 2014. ,
DOI : 10.1145/1530748.1530797
A monolingual tree-based translation model for sentence simplification, Proceedings of the 23rd International Conference on Computational Linguistics, pp.1353-1361, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00795670
Keyboard acoustic emanations revisited, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-26, 2009. ,
DOI : 10.1145/1609956.1609959