%PDF-1.6
%
1 0 obj
<>
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
IEEE
2018 IEEE Conference on Communications and Network Security (CNS);2018; ; ;10.1109/CNS.2018.8433216
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Prakash Shrestha
Babins Shrestha
Nitesh Saxena
endstream
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
xAo@slMIR4^).xtYӴhMfoJ56+tCw n[G9 L~:CPi+r [ӕ{lj_A')@!E2ODRq!ϲeg`gFl-#ah<e;G
endstream
endobj
6 0 obj
<>stream
x+ |
endstream
endobj
7 0 obj
<>stream
xAo@slJmiiK"qmR\ue`Mf_5=/GN4c0ᴵ.[nqXZG{/PkLSe5\+w(jA')@!EXEb~q4I [T}<J4miC!;J
endstream
endobj
8 0 obj
<>stream
x+ |
endstream
endobj
9 0 obj
<>stream
xAo@sDqHJ"x5e^lMfŚFG+}&w/1FUSwag -Lv+=G8lolPkL
tJe>Q+)@!E4EbB$ M[[MS>M_;H
endstream
endobj
10 0 obj
<>stream
x+ |
endstream
endobj
11 0 obj
<>stream
xAo@sI릤bK"xE\u
pYb__JMf%6δ@Ѵ5agLۏz3ўc%J%*W$Y |ok.[+ R"~~E~q,MS컚 齳( 0WJ5}ц !;K
endstream
endobj
12 0 obj
<>stream
x+ |
endstream
endobj
13 0 obj
<>stream
xAo@sI(嶴hIF6\)6eM^4s&3ґMOc} [!(m-MS~uC%*W$z o5\;l*AG)@!E{Y(
(9xj-]";L
endstream
endobj
14 0 obj
<>stream
x+ |
endstream
endobj
15 0 obj
<>stream
xAo@s)-D4ڵJq5˚z7~(4>S3 .4aDki> -Mw/=8l/lPk\lgJT\+7ؖC)@!E>Eq,MSۊ 鼳t(ڶoj=$!;N
endstream
endobj
16 0 obj
<>stream
x+ |
endstream
endobj
17 0 obj
<>stream
xAo@sIKMۢ%)p5^W
貤`MfŚV`}!)J;`N[Cj_͜Qʴ7ci9~}TSYyPY55-qQ
)PzHFb^A$ ]@azl-=ʮ7%v?;F
endstream
endobj
18 0 obj
<>stream
x+ |
endstream
endobj
19 0 obj
<>stream
xAo@s-r[$QWq5c}`Ek;>O$;0ϭ7uvQm[kRYs"a5W NYQYcw8HٗB
RDHSWH$)ٙ X;[xuiGRiC+ M;I
endstream
endobj
20 0 obj
<>stream
x+ |
endstream
endobj
21 0 obj
<>stream
xAo@sD嶴Ԓ4\)
貦ihMf5=Uv%nq'Zܱ@u4SfgmL?Nf*=G(7L=i]e^o>LWm<)RHCyJi$ [Gxߔhӎ#];M
endstream
endobj
22 0 obj
<>stream
HWK
WQjD8CZ#f(R&= &5 x|}~ʓv.̓\qiVF[7YaFFq|mf<^GiPU9\uǨ{"@`]ߤUVԺS n8YۿW(Zm?Kwh_9vMFCb0]<9O?
l;s;DrpYpʒLwTgG gOx
ؖxeUw pgm4{I!RzG4Bxh橛y(yx;3Vtn#U$WR04~av# A=i!1t_IZ,zrW_u