{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:58:13Z","timestamp":1771700293314,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319125671","type":"print"},{"value":"9783319125688","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45355-1_2","type":"book-chapter","created":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T13:55:29Z","timestamp":1412949329000},"page":"15-27","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Malicious Software Execution in Programmable Logic Controllers Using Power Fingerprinting"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Aguayo Gonzalez","sequence":"first","affiliation":[]},{"given":"Alan","family":"Hinton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Proceedings of the Software Defined Radio Technical Conference and Product Exposition","author":"C. Aguayo Gonzalez","year":"2009","unstructured":"C. Aguayo Gonzalez and J. Reed, Dynamic power consumption monitoring in SDR and CR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, 2009."},{"key":"2_CR2","volume-title":"Proceedings of the IEEE Military Communications Conference","author":"C. Aguayo Gonzalez","year":"2009","unstructured":"C. Aguayo Gonzalez and J. Reed, Power fingerprinting in SDR and CR integrity assessment, Proceedings of the IEEE Military Communications Conference, 2009."},{"key":"2_CR3","first-page":"2211","volume-title":"Proceedings of the IEEE Military Communications Conference","author":"C. Aguayo Gonzalez","year":"2010","unstructured":"C. Aguayo Gonzalez and J. Reed, Detecting unauthorized software execution in SDR using power fingerprinting, Proceedings of the IEEE Military Communications Conference, pp. 2211\u20132216, 2010."},{"key":"2_CR4","first-page":"689","volume-title":"Proceedings of the Software Defined Radio Technical Conference and Product Exposition","author":"C. Aguayo Gonzalez","year":"2010","unstructured":"C. Aguayo Gonzalez and J. Reed, Power fingerprinting in unauthorized software execution detection for SDR regulatory compliance, Proceedings of the Software Defined Radio Technical Conference and Product Exposition, pp. 689\u2013694, 2010."},{"issue":"2-3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10470-011-9777-4","volume":"69","author":"C. Aguayo Gonzalez","year":"2011","unstructured":"C. Aguayo Gonzalez and J. Reed, Power fingerprinting in SDR integrity assessment for security and regulatory compliance, Analog Integrated Circuits and Signal Processing, vol. 69(2-3), pp. 307\u2013327, 2011.","journal-title":"Analog Integrated Circuits and Signal Processing"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol. 3(3), pp. 186\u2013205, 2000.","journal-title":"ACM Transactions on Information and System Security"},{"key":"2_CR7","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/1378600.1378626","volume-title":"Proceedings of the Sixth International Conference on Mobile Systems, Applications and Services","author":"A. Bose","year":"2008","unstructured":"A. Bose, X. Hu, K. Shin and T. Park, Behavioral detection of malware on mobile handsets, Proceedings of the Sixth International Conference on Mobile Systems, Applications and Services, pp. 225\u2013238, 2008."},{"key":"2_CR8","volume-title":"Proceedings of the Second International Conference on Security and Privacy in Communications Networks and the Securecomm Workshops","author":"A. Bose","year":"2006","unstructured":"A. Bose and K. Shin, On mobile viruses exploiting messaging and Bluetooth services, Proceedings of the Second International Conference on Security and Privacy in Communications Networks and the Securecomm Workshops, 2006."},{"key":"2_CR9","first-page":"32","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"M. Christodorescu","year":"2005","unstructured":"M. Christodorescu, S. Jha, S. Seshia, D. Song and R. Bryant, Semantics-aware malware detection, Proceedings of the IEEE Symposium on Security and Privacy, pp. 32\u201346, 2005."},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-23644-0_19","volume-title":"Recent Advances in Intrusion Detection","author":"A. Cui","year":"2011","unstructured":"A. Cui and S. Stolfo, Defending embedded systems with software symbiotes, Proceedings of the Fourteenth International Symposium on Recent Advances in Intrusion Detection, pp. 358\u2013377, 2011."},{"key":"2_CR11","volume-title":"Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges","author":"S. Das","year":"2012","unstructured":"S. Das, K. Kant and N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Morgan Kaufmann, Waltham, Massachusetts, 2012."},{"key":"2_CR12","first-page":"417","volume-title":"Proceedings of the Ninth International Conference on Information Technology","author":"H. Erbacher","year":"2012","unstructured":"H. Erbacher and S. Hutchinson, Distributed sensor objects for intrusion detection systems, Proceedings of the Ninth International Conference on Information Technology, pp. 417\u2013424, 2012."},{"key":"2_CR13","volume-title":"W32.Stuxnet Dossier, Version 1.4","author":"N. Falliere","year":"2011","unstructured":"N. Falliere, L. O\u2019Murchu and E. Chien, W32.Stuxnet Dossier, Version 1.4, Symantec, Mountain View, California, 2011."},{"key":"2_CR14","first-page":"91","volume-title":"Proceedings of the Seventeenth USENIX Security Symposium","author":"J. Oberheide","year":"2008","unstructured":"J. Oberheide, E. Cooke and F. Jahanian, CloudAV: N-version antivirus in the network cloud, Proceedings of the Seventeenth USENIX Security Symposium, pp. 91\u2013106, 2008."},{"key":"2_CR15","volume-title":"Trends in Circumventing Web-Malware Detection","author":"M. Rajab","year":"2011","unstructured":"M. Rajab, L. Ballard, N. Jagpal, P. Mavrommatis, D. Nojiri, N. Provos and L. Schmidt, Trends in Circumventing Web-Malware Detection, Google Technical Report rajab-2011a, Google, Mountain View, California, 2011."},{"key":"2_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-24864-1_3","volume-title":"Critical Infrastructure Protection V","author":"J. Reeves","year":"2011","unstructured":"J. Reeves, A. Ramaswamy, M. Locasto, S. Bratus and S. Smith, Lightweight intrusion detection for resource-constrained embedded control systems, in Critical Infrastructure Protection V, J. Butts and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 31\u201346, 2011."},{"key":"2_CR17","unstructured":"S. Stone, Radio-Frequency-Based Programmable Logic Controller Anomaly Detection, Ph.D. Dissertation, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, 2013."},{"issue":"2","key":"2_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.ijcip.2012.05.001","volume":"5","author":"S. Stone","year":"2012","unstructured":"S. Stone and M. Temple, Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure, International Journal of Critical Infrastructure Protection, vol. 5(2), pp. 66\u201373, 2012.","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"8","key":"2_CR19","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"C. Tankard","year":"2011","unstructured":"C. Tankard, Advanced persistent threats and how to monitor and deter them, Network Security, vol. 2011(8), pp. 16\u201319, 2011","journal-title":"Network Security"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45355-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T20:02:07Z","timestamp":1650398527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45355-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45355-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}