{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:34:07Z","timestamp":1758893647595,"version":"3.27.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,19]]},"DOI":"10.1109\/acit62333.2024.10712474","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:15Z","timestamp":1729101075000},"page":"505-510","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks"],"prefix":"10.1109","author":[{"given":"Khalid","family":"Alemerien","sequence":"first","affiliation":[{"name":"Tafila Technical University,Information Technology Department,Tafila,Jordan"}]},{"given":"Sadeq","family":"Al-Suhemat","sequence":"additional","affiliation":[{"name":"Isra University,Faculty of Information Technology,Amman,Jordan"}]},{"given":"Fadi","family":"Alsuhimat","sequence":"additional","affiliation":[{"name":"Philadelphia University,Cyber Security Department,Amman,Jordan"}]},{"given":"Enshirah","family":"Altarawneh","sequence":"additional","affiliation":[{"name":"Hashemite University,Computer Engineering Department,Zarqa,Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202309.1769.v1","article-title":"Cyber-attacks on Public Key Cryptography","author":"Radanliev","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app12168246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3569577"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i3.422-444"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18122\/td\/1611\/boisestate"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3578938"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2953855"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DICTA.2016.7797091"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app11156790"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app12168246"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152831"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.15625\/1813-9663\/37\/1\/15418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2017.8217429"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582827"},{"article-title":"Computational Methods for Gait Analysis in Rodents","year":"2020","author":"Timotius","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3252022"},{"volume-title":"TELECOM Paris Tech SEN research group: DPA Contest","key":"ref23","first-page":"2013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12310-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5755\/j02.eie.33995"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i1.4024"},{"key":"ref27","article-title":"Deep learning based side-channel attack: a new profiling methodology based on multi-label classification","author":"Maghrebi","year":"2020","journal-title":"Cryptology ePrint Archive."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-018-5726-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1575\/1\/012026"},{"key":"ref30","article-title":"A Dataset Generation Framework for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks","author":"Narimani","year":"2022","journal-title":"Journal of IEEE Transactions On Computers"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08302-5_7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117761"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3640771.3644115"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424305"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.54654\/isj.v1i15.834"}],"event":{"name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2024,9,19]]},"location":"Ceske Budejovice, Czech Republic","end":{"date-parts":[[2024,9,21]]}},"container-title":["2024 14th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10712446\/10712447\/10712474.pdf?arnumber=10712474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T07:53:58Z","timestamp":1729151638000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10712474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,19]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/acit62333.2024.10712474","relation":{},"subject":[],"published":{"date-parts":[[2024,9,19]]}}}