PDF
Timing Analysis of Keystrokes and Timing Attacks on SSH
Wireshark Quickstart Guide
https://wiki.wireshark.org/SSH
Keystroke timing obfuscation added to ssh(1)
Keyboard Usage Authentication using Time Series Analysis
Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation
Side-channel / Timing Attacks
https://www.theguardian.com/world/2025/jun/13/pentagon-pizza-delivery-israel-iran-attack
CPU timing attack (more reseach required)