{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:09:57Z","timestamp":1772122197516,"version":"3.50.1"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647336","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:34:06Z","timestamp":1550792046000},"page":"206-212","source":"Crossref","is-referenced-by-count":3,"title":["Keyboard Side Channel Attacks on Smartphones Using Sensor Fusion"],"prefix":"10.1109","author":[{"given":"Nithin","family":"Murali","sequence":"first","affiliation":[]},{"given":"Kumar","family":"Appaiah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046771"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.25080\/Majora-7b98e3ed-003","article-title":"librosa: Audio and Music Signal Analysis in Python","author":"mcfee","year":"2015","journal-title":"Proc 14th Python Sci Conf"},{"key":"ref6","article-title":"A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques","author":"halevi","year":"2012","journal-title":"ACM CCS"},{"key":"ref5","article-title":"Keyboard acoustic emanations revisited","volume":"13","author":"li","year":"2009","journal-title":"ACM Trans Inf Syst Secur"},{"key":"ref11","author":"nithin","year":"2018","journal-title":"Keysnopper"},{"key":"ref8","article-title":"Context-free attacks using keyboard acoustic emanations","year":"2014","journal-title":"ACM CCS"},{"key":"ref7","article-title":"Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP","volume":"abs 1609 9359","author":"compagno","year":"2016","journal-title":"CoRR"},{"key":"ref2","article-title":"On the Best Sensor for Keystrokes Inference Attack on Android","volume":"11","author":"ahmed","year":"2013","journal-title":"Procedia Technology"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/s10207-014-0264-7","article-title":"Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios","volume":"14","author":"tzipora","year":"2015","journal-title":"International Journal of Information Security"},{"key":"ref9","article-title":"Mel Frequency Cepstral Coefficients for Music Modeling","author":"logan","year":"2000","journal-title":"International Symposium on Music Information Retrieval"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2018,12,9]]},"end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647336.pdf?arnumber=8647336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:55:19Z","timestamp":1643237719000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647336","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}