{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:29:10Z","timestamp":1765438150461,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":16,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_31","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"183-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Using Support Vector Machines for Passive Steady State RF Fingerprinting"],"prefix":"10.1007","author":[{"given":"Georgina O\u2019Mahony","family":"Zamora","sequence":"first","affiliation":[]},{"given":"Susan","family":"Bergin","sequence":"additional","affiliation":[]},{"given":"Irwin O.","family":"Kennedy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"31_CR1","unstructured":"R.M. Gerdes, T.E. Daniels, M. Mina and S.F. Russell, \u201c Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach\u201d, ISOC Network and Distributed, System Security Symposium, February 2006."},{"key":"31_CR2","unstructured":"L.T.W. Ho and H. Claussen, \u201cEffects of User-Deployed, Co-Channel Femtocells on the Call Drop Probability in a Residential Scenario\u201d, IEEE International Symposium on Personal, Indoor and Mobile Communications, September 2007."},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"I.O. Kennedy, P.Scanlon and M. Buddhikiot, \u201cPassive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-channel Femto Cell Underlays\u201d, Proceedings IEEE Conference on Dynamic Spectrum Access Networks, October 2008.","DOI":"10.1109\/DYSPAN.2008.46"},{"key":"31_CR4","unstructured":"J. Hall, M. Barbeau and E. Kranakis, \u201cDetecting rogue devices in Bluetooth networks using Radio Frequency Fingerprinting\u201d, Proceedings of the International Conference on Communications and Computer Networks, October 2006."},{"key":"31_CR5","unstructured":"D. Shaw and W. Kinsner, \u201cMultifractal Modelling of Radio Transmitter Transients for Classification\u201d, Proceedings Conference on Communications, Power and Computing, pp. 306\u2013312, May 1997."},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"H. Tekbas, N. Serinken and O. Ureten, \u201cAn experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions\u201d, Canadian Journal Computer Engineering, 2004.","DOI":"10.1109\/CJECE.2004.1532524"},{"key":"31_CR7","unstructured":"O. Ureten and N. Serinken, \u201cBayesian detection of transmitter turn-on transients\u201d, Proceedings NSIP99, pp. 830\u2013834, June 1999."},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1049\/el:19991369","volume":"35","author":"O. Ureten","year":"1999","unstructured":"O. Ureten and N. Serinken, \u201cDetections of radio transmitter turn-on transients\u201d, Electronic Letters, vol. 35, pp. 1996\u20131997, November 1999.","journal-title":"Electronic Letters"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"K. Ellis and N. Serinken. Characteristics of radio transmitter fingerprints. Journal of Radio Science, pp. 585\u2013597, 2001.","DOI":"10.1029\/2000RS002345"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J. Burges","year":"1998","unstructured":"C.J. Burges, \u201cA Tutorial on Support Vector Machines for Pattern Recognition\u201d, Knowledge Discovery and Data Mining, vol. 2, pp. 121 \u2013 167, 1998.","journal-title":"Knowledge Discovery and Data Mining"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"B. ScholKopf and A. J. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. MIT Press, 2002.","DOI":"10.7551\/mitpress\/4175.001.0001"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"S. Knerr, L. Personnaz and G. Dreyfus, \u201cSingle-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network\u201d, Neurocomputing: Algorithms, Architectures and Applications, 1990.","DOI":"10.1007\/978-3-642-76153-9_5"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TNN.2002.1000139","volume":"13","author":"C.-W. Hsu","year":"2002","unstructured":"C.-W. Hsu and C.-J. Lin, \u201cA Comparison of Methods for Multiclass Support Vector Machines\u201d, IEEE Transactions on Neural Networks, vol. 13, pp. 412\u2013425, 2002.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"31_CR14","unstructured":"J. Milgram, M. Cheriet and R. Sabourin, \u201c\u2018One Against One\u2019 or \u2018One Against All\u2019: Which One is Better for Handwriting Recognition with SVMs?\u201d, Tenth International Workshop on Frontiers in Handwriting Recognition, 2006."},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"J. Platt, \u201cProbabilistic outputs for support vector machines and comparison to regularized likelihood methods\u201d, Advances in Large Margin Classifiers , pp. 61\u201374, 2000.","DOI":"10.7551\/mitpress\/1113.003.0008"},{"key":"31_CR16","unstructured":"T. Luke, A.M. Gardiner, J. Kvall, \u201cGlobal Wireless Semiconductor Update\u201d, Lehman Brothers Equity Research Note, April 29th 2008."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T03:11:37Z","timestamp":1739761897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_31","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}