Cited By
View all- Chen YLi WCheng XHu P(2024)A survey of acoustic eavesdropping attacks: Principle, methods, and progressHigh-Confidence Computing10.1016/j.hcc.2024.100241(100241)Online publication date: May-2024
With respect to security, sensor networks have a number of considerations that separate them from traditional distributed systems. First, sensor devices are typically vulnerable to physical compromise. Second, they have significant power and processing ...
This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service DDoS attack incidents and the nature of Denial of Service DoS attacks in a distributed environment that ...
Earpiece mode of smartphones is often used for confidential communication. In this paper, we proposed a remote(>2m) and motion-resilient attack on smartphone earpiece. We developed an end-to-end eavesdropping system mmEve based on a commercial mmWave ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format