A New Pipeline for Snooping Keystroke Based on Deep Learning Algorithm
This research focuses on the vulnerabilities of keystroke by logging on a physical computer keyboard, known as Snooping Keystroke. This category of attacks occurs recording an audio track with a smartphone while typing on the keyboard, and processing the audio to detect individual pressed keys. To a...
Saved in:
Main Authors: | Massimo Orazio Spata, Valerio Maria Russo, Alessandro Ortis, Sebastiano Battiato |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10858134/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Attack Level of Brown Planthopper Nilaparvata lugens Stal (Hemiptera: Delphacidae) on Varieties of Rice from Pasaman in Greenhouse
by: Eva Zulaikha, et al.
Published: (2021-07-01) -
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
by: DRAGOS-ALEXANDRU ANDRIOAIA
Published: (2022-10-01) -
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
by: Umm e Kulsoom, et al.
Published: (2024-01-01) -
Recurrent “transient ischemic attacks” caused by pulmonary arteriovenous malformation
by: Jorrit B.A. Welling, et al.
Published: (2025-01-01) -
A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy
by: Yaoying Wang
Published: (2023-09-01)