Cited By
View all- Álvarez LMoser DLenders V(2022)High Data Throughput Exfiltration Through Video Cable EmanationsCritical Information Infrastructures Security10.1007/978-3-031-35190-7_3(27-48)Online publication date: 14-Sep-2022
- Choi JYang HCho DLigatti JOu XKatz JVigna G(2020)TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417241(1085-1101)Online publication date: 30-Oct-2020
- Schmitt EVoigt-Antons J(2020)Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor ReadingsHCI for Cybersecurity, Privacy and Trust10.1007/978-3-030-50309-3_43(637-651)Online publication date: 19-Jul-2020
- Show More Cited By