共 30 条
[11]
Lee T.H., 2014, Advanced Technologies, Embedded and Multimedia for Human-Centric Computing: HumanCom and EMC 2013, P1205
[12]
(Smart)Watch Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches
[J].
ISWC 2015: PROCEEDINGS OF THE 2015 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS,
2015,
:27-30
[13]
Nahapetian Ani, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P243, DOI 10.1109/CCNC.2016.7444763
[14]
Olsson J., 2014, Texas Instruments, P13
[15]
Ortiz A., MS12A MONITORING COM
[16]
Petracca G, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P379
[17]
Pharate A., 2015, Int. J. Comput. Appl, V118, P23, DOI DOI 10.5120/20758-3163
[18]
Pongle P., 2015, International Journal of Computer Applications, V121, P1, DOI DOI 10.5120/21565-4589
[19]
SVELTE: Real-time intrusion detection in the Internet of Things
[J].
AD HOC NETWORKS,
2013, 11 (08)
:2661-2674
[20]
Rios Erkuden, 2015, Proceedings of the 5th International Conference on Cloud Computing and Services Science (CLOSER 2015), P551