Your Mic Leaks Too Much: A Double-Edged Sword for Security.
Soundarya RameshPublished in: MobiSys (2024)
Keyphrases
- information flow
- information security
- security requirements
- intrusion detection
- security problems
- security systems
- security policies
- security issues
- information assurance
- automatic identification
- security management
- computer security
- network security
- access control
- security model
- statistical databases
- security properties
- neural network
- leak detection
- security measures
- security threats
- risk analysis
- security mechanisms