1. Keystroke recognition using wifi signals;Ali,2015
2. Keyboard acoustic emanations;Asonov,2004
3. Clearshot: Eavesdropping on keyboard input from video;Balzarotti,2008
4. Fault injection attacks on cryptographic devices: theory, practice, and countermeasures;Barenghi;Proc. IEEE,2012
5. The vulnerabilities of biometric systems - an integrated look and old and new ideas;Bartlow,2005