{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:34Z","timestamp":1750188634058,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031708787"},{"type":"electronic","value":"9783031708794"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70879-4_9","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:20Z","timestamp":1725476540000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MAG-JAM: Jamming Detection via\u00a0Magnetic Emissions"],"prefix":"10.1007","author":[{"given":"Omar Adel","family":"Ibrahim","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46\u201357 (2005)","key":"9_CR1","DOI":"10.1145\/1062689.1062697"},{"doi-asserted-by":"crossref","unstructured":"Swinney, C.J., Woods, J.C.: GNSS jamming classification via CNN, transfer learning & the novel concatenation of signal representations. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20139. IEEE (2021)","key":"9_CR2","DOI":"10.1109\/CyberSA52016.2021.9478250"},{"doi-asserted-by":"crossref","unstructured":"Alhazbi, S., Sciancalepore, S., Oligeri, G.: Bloodhound: early detection and identification of jamming at the phy-layer. In: IEEE 20th Consumer Communications & Networking Conference (CCNC). IEEE 2023, pp. 1033\u20131041 (2023)","key":"9_CR3","DOI":"10.1109\/CCNC51644.2023.10059878"},{"doi-asserted-by":"crossref","unstructured":"Sciancalepore, S., Kusters, F., Abdelhadi, N.K., Oligeri, G.: Jamming detection in low-BER mobile indoor scenarios via deep learning. IEEE Internet Things J. (2023)","key":"9_CR4","DOI":"10.1109\/JIOT.2023.3343611"},{"unstructured":"Jackson, J.D.: Classical electrodynamics (1999)","key":"9_CR5"},{"unstructured":"Instruments, T.: DRV425: Fully-integrated fluxgate magnetic sensor for open-loop applications (2024). https:\/\/www.ti.com\/tool\/DRV425EVM. Accessed 2 Feb 2024","key":"9_CR6"},{"key":"9_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2022.108773","volume":"46","author":"S Alhazbi","year":"2023","unstructured":"Alhazbi, S., Sciancalepore, S., Oligeri, G.: A dataset of physical-layer measurements in indoor wireless jamming scenarios. Data Brief 46, 108773 (2023)","journal-title":"Data Brief"},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101648","volume":"85","author":"S Saxena","year":"2022","unstructured":"Saxena, S., Pandey, A., Kumar, S.: RSS based multistage statistical method for attack detection and localization in IoT networks. Pervasive Mob. Comput. 85, 101648 (2022)","journal-title":"Pervasive Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Pawlak, J., et al.: A machine learning approach for detecting and classifying jamming attacks against OFDM-based UAVs. In: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, pp. 1\u20136 (2021)","key":"9_CR9","DOI":"10.1145\/3468218.3469049"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"16 859","DOI":"10.1109\/ACCESS.2022.3150020","volume":"10","author":"Y Li","year":"2022","unstructured":"Li, Y., et al.: Jamming detection and classification in OFDM-based UAVs via feature-and spectrogram-tailored machine learning. IEEE Access 10, 16 859-16 870 (2022)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Liu, D., Raymer, J., Fox, A.: Efficient and timely jamming detection in wireless sensor networks. In: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pp. 335\u2013343. IEEE (2012)","key":"9_CR11","DOI":"10.1109\/MASS.2012.6502533"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Jere, S., Banerjee, S., Liu, L., Shetty, S., Dayekh, S.: Anonymous jamming detection in 5g with bayesian network model based inference analysis. In: 2022 IEEE 23rd International Conference on High Performance Switching and Routing (HPSR), pp. 151\u2013156. IEEE (2022)","key":"9_CR12","DOI":"10.1109\/HPSR54439.2022.9831286"},{"issue":"19","key":"9_CR13","doi-asserted-by":"publisher","first-page":"21 817","DOI":"10.1109\/JSEN.2021.3103042","volume":"21","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Jiu, B., Wang, P., Liu, H., Liang, S.: An end-to-end anti-jamming target detection method based on CNN. IEEE Sensors J. 21(19), 21 817-21 828 (2021)","journal-title":"IEEE Sensors J."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3214285","volume":"71","author":"K-D Lu","year":"2022","unstructured":"Lu, K.-D., Wu, Z.-G.: Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems. IEEE Trans. Instrum. Meas. 71, 1\u201310 (2022)","journal-title":"IEEE Trans. Instrum. Meas."},{"unstructured":"O\u2019Shea, T.J., Clancy, T.C., McGwier, R.W.: Recurrent neural radio anomaly detection. arXiv preprint arXiv:1611.00301 (2016)","key":"9_CR15"},{"doi-asserted-by":"crossref","unstructured":"Rajendran, S., Meert, W., Lenders, V., Pollin, S.: Saife: unsupervised wireless spectrum anomaly detection with interpretable features. In: IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE 2018, pp. 1\u20139 (2018)","key":"9_CR16","DOI":"10.1109\/DySPAN.2018.8610471"},{"doi-asserted-by":"crossref","unstructured":"Roux, J., Alata, E., Auriol, G., Ka\u00e2niche, M., Nicomette, V., Cayre, R.: Radiot: radio communications intrusion detection for IoT-a protocol independent approach. In: IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE 2018, pp. 1\u20138 (2018)","key":"9_CR17","DOI":"10.1109\/NCA.2018.8548286"},{"issue":"3","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3441458","volume":"5","author":"P-F Gimenez","year":"2021","unstructured":"Gimenez, P.-F., Roux, J., Alata, E., Auriol, G., Ka\u00e2niche, M., Nicomette, V.: Rids: radio intrusion detection and diagnosis system for wireless communications in smart environment. ACM Trans. Cyber-Phys. Syst. 5(3), 1\u20131 (2021)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"3","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/TWC.2013.013014.131037","volume":"13","author":"M Spuhler","year":"2014","unstructured":"Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., Schmitt, J.B.: Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wireless Commun. 13(3), 1593\u20131603 (2014)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"2","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1824766.1824772","volume":"7","author":"M Strasser","year":"2010","unstructured":"Strasser, M., Danev, B., \u010capkun, S.: Detection of reactive jamming in sensor networks. ACM Trans. Sens. Networks (TOSN) 7(2), 1\u201329 (2010)","journal-title":"ACM Trans. Sens. Networks (TOSN)"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2013-208","volume":"2013","author":"N Sufyan","year":"2013","unstructured":"Sufyan, N., Saqib, N.A., Zia, M.: Detection of jamming attacks in 802.11 b wireless networks. EURASIP J. Wirel. Commun. Netw. 2013, 1\u201318 (2013)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"unstructured":"Maia, H.T., Xiao, C., Li, D., Grinspun, E., Zheng, C.: Can one hear the shape of a neural network?: Snooping the GPU via magnetic side channel. arXiv preprint arXiv:2109.07395 (2021)","key":"9_CR22"},{"doi-asserted-by":"crossref","unstructured":"Xiao, R., Li, T., Ramesh, S., Han, J., Han, J.: Magtracer: detecting GPU cryptojacking attacks via magnetic leakage signals. In: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, pp. 1\u201315 (2023)","key":"9_CR23","DOI":"10.1145\/3570361.3613283"},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: CamRadar: hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 6, no. 4, pp. 1\u201325 (2023)","key":"9_CR24","DOI":"10.1145\/3569505"},{"doi-asserted-by":"crossref","unstructured":"Ramesh, S., Hadi, G.S., Yang, S., Chan, M.C., Han, J.: Ticktock: detecting microphone status in laptops leveraging electromagnetic leakage of clock signals. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 2475\u20132489 (2022)","key":"9_CR25","DOI":"10.1145\/3548606.3560698"},{"issue":"1","key":"9_CR26","first-page":"1","volume":"20","author":"OA Ibrahim","year":"2020","unstructured":"Ibrahim, O.A., Sciancalepore, S., Oligeri, G., Di Pietro, R.: Magneto: fingerprinting USB flash drives via unintentional magnetic emissions. ACM Trans. Embedded Comput. Syst. (ACM TECS) 20(1), 1\u201326 (2020)","journal-title":"ACM Trans. Embedded Comput. Syst. (ACM TECS)"},{"doi-asserted-by":"crossref","unstructured":"Cheng, Y., Ji, X., Zhang, J., Xu, W., Chen, Y.-C.: DemiCPU: device fingerprinting with magnetic signals radiated by CPU. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1149\u20131170 (2019)","key":"9_CR27","DOI":"10.1145\/3319535.3339810"},{"doi-asserted-by":"publisher","unstructured":"Ibrahim, O.A., Sciancalepore, S., Di Pietro, R.: MAG-PUF: magnetic physical unclonable functions for device authentication in the IoT. In: Li, F., Liang, K., Lin, Z., Katsikas, S.K. (eds.) SecureComm 2022. LNCS, vol. 462, pp. 130\u2013149. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-25538-0_8","key":"9_CR28","DOI":"10.1007\/978-3-031-25538-0_8"},{"doi-asserted-by":"crossref","unstructured":"Ibrahim, O.A., Sciancalepore, S., Di Pietro, R.: MAG-PUFs: authenticating IoT devices via electromagnetic physical unclonable functions and deep learning. Comput. Secur. 103905 (2024)","key":"9_CR29","DOI":"10.1016\/j.cose.2024.103905"},{"doi-asserted-by":"crossref","unstructured":"Ibrahim, O.A., Di\u00a0Pietro, R.: MAG-AUTH: authenticating wireless transmitters and receivers on the receiver side via magnetic emissions. In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 305\u2013316 (2023)","key":"9_CR30","DOI":"10.1145\/3558482.3590198"},{"doi-asserted-by":"crossref","unstructured":"He, J., Guo, X., Ma, H., Liu, Y., Zhao, Y., Jin, Y.: Runtime trust evaluation and hardware trojan detection using on-chip EM sensors. In: 57th ACM\/IEEE Design Automation Conference (DAC). IEEE 2020, pp. 1\u20136 (2020)","key":"9_CR31","DOI":"10.1109\/DAC18072.2020.9218514"},{"doi-asserted-by":"crossref","unstructured":"Chaman, A., Wang, J., Sun, J., Hassanieh, H., Roy\u00a0Choudhury, R.: Ghostbuster: detecting the presence of hidden eavesdroppers. In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, pp. 337\u2013351 (2018)","key":"9_CR32","DOI":"10.1145\/3241539.3241580"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70879-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:04:28Z","timestamp":1725476668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70879-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708787","9783031708794"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70879-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}