{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:58:47Z","timestamp":1725544727126},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/icsai.2014.7009361","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:37:49Z","timestamp":1421721469000},"page":"624-628","source":"Crossref","is-referenced-by-count":0,"title":["A low-cost and efficient method of determining the best frequency band for video leaking signal reconstruction"],"prefix":"10.1109","author":[{"given":"De-gang","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jun","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"1767","article-title":"Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system","author":"elibol","year":"2012","journal-title":"Signal Processing Conference (EUSIPCO) 2012 Proceedings of the 20th European"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TUFFC.2012.2309"},{"key":"12","first-page":"1","article-title":"Evaluating the Information Content of the Computer Monitor Radio Frequency Radiation Using a Simple Technique","author":"wiesner","year":"2009","journal-title":"Network and Service Security"},{"key":"3","article-title":"Compromising emanations: Eavesdropping risks of computer displays","author":"kuhn","year":"2003","journal-title":"Technical Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"1","article-title":"NSA tempest documents","author":"young","year":"2008","journal-title":"Crypto"},{"key":"10","first-page":"93","article-title":"Audio fingerprinting based on harmonic enhancement and spectral subband centroid","author":"deng","year":"2011","journal-title":"Wireless Mobile and Computing IET International Communication Conference"},{"key":"7","article-title":"Method for determining the best frequency band for eavesdropping the display image of a PC","author":"yu-lei","year":"2013","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_13"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e90-b.11.3315"},{"key":"4","first-page":"24","article-title":"Eavesdropping attacks on computer displays","author":"kuhn","year":"2006","journal-title":"Information Security Summit Prague"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2005.855834"},{"key":"8","first-page":"617","article-title":"Spectral sub-band centroid features for speech recognition","author":"paliwal","year":"1998","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing"}],"event":{"name":"2014 2nd International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2014,11,15]]},"location":"Shanghai, China","end":{"date-parts":[[2014,11,17]]}},"container-title":["The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994954\/7009247\/07009361.pdf?arnumber=7009361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T01:07:40Z","timestamp":1490317660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icsai.2014.7009361","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}