D. Asonov and R. Agrawal, Keyboard acoustic emanations, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.3-11, 2004.
DOI : 10.1109/SECPRI.2004.1301311

J. Benesty, J. Chen, and Y. Huang, Time-Delay Estimation via Linear Interpolation and Cross Correlation, IEEE Transactions on Speech and Audio Processing, vol.12, issue.5, pp.509-519, 2004.
DOI : 10.1109/TSA.2004.833008

V. V. Bochkarev, A. V. Shevlyakova, and V. D. Solovyev, Average word length dynamics as indicator of cultural changes in society. arXiv preprint arXiv:1208, p.6109, 2012.

P. F. Brown, P. V. Desouza, R. L. Mercer, V. J. Pietra, and J. C. Lai, Class-based ngram models of natural language, Computational linguistics, vol.18, issue.4, pp.467-479, 1992.

D. Dagon, T. Martin, and T. Starner, Mobile phones as computing devices: the viruses are coming! Pervasive Computing, pp.11-15, 2004.
DOI : 10.1109/mprv.2004.21

T. Halevi and N. Saxena, Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing, IEEE Transactions on Information Forensics and Security, vol.8, issue.3, pp.563-577, 2013.
DOI : 10.1109/TIFS.2013.2247758

M. Hussain, A. Haiqi, A. Zaidan, B. Zaidan, M. M. Kiah et al., The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks, Pervasive and Mobile Computing, vol.25, pp.1-25, 2015.
DOI : 10.1016/j.pmcj.2015.12.001

X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, When Good Becomes Evil, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1273-1285, 2015.
DOI : 10.1145/2660267.2660296

W. Meng, W. H. Lee, S. Murali, and S. Krishnan, Charging Me and I Know Your Secrets!, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS '15, pp.89-98, 2015.
DOI : 10.1145/1609956.1609959

E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, Tapprints, Proceedings of the 10th international conference on Mobile systems, applications, and services, MobiSys '12, pp.323-336, 2012.
DOI : 10.1145/2307636.2307666

D. Ping, X. Sun, and B. Mao, TextLogger, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, pp.1-12, 2015.
DOI : 10.1145/2046707.2046771

T. Zhu, Q. Ma, S. Zhang, and Y. Liu, Context-free Attacks Using Keyboard Acoustic Emanations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.453-464, 2014.
DOI : 10.1145/1530748.1530797

Z. Zhu, D. Bernhard, and I. Gurevych, A monolingual tree-based translation model for sentence simplification, Proceedings of the 23rd International Conference on Computational Linguistics, pp.1353-1361, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00795670

L. Zhuang, F. Zhou, and J. D. Tygar, Keyboard acoustic emanations revisited, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-26, 2009.
DOI : 10.1145/1609956.1609959