{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:59:10Z","timestamp":1768417150043,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004948","name":"Michigan Economic Development Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004948","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130113","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"544-549","source":"Crossref","is-referenced-by-count":1,"title":["A Lightweight IDS Framework Using FPGA-Based Hardware Fingerprinting on Zynq SoC"],"prefix":"10.1109","author":[{"given":"Abdul Waheed","family":"Mohammed","sequence":"first","affiliation":[{"name":"University of Michigan-Dearborn,Information Systems, Security and Forensics Lab,Dearborn,USA"}]},{"given":"Abbas","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Information Systems, Security and Forensics Lab,Dearborn,USA"}]},{"given":"Hasan","family":"Arif","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Information Systems, Security and Forensics Lab,Dearborn,USA"}]},{"given":"Fazal Rahaman Pasha","family":"Mohammed","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Information Systems, Security and Forensics Lab,Dearborn,USA"}]},{"given":"Hafiz","family":"Malik","sequence":"additional","affiliation":[{"name":"University of Michigan-Dearborn,Information Systems, Security and Forensics Lab,Dearborn,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3410447"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2024.03.064"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI61503.2024.10607421"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2017.8267643"},{"key":"ref5","first-page":"16","article-title":"Rafi Ud Daula Refat, and Hafiz Malik. Fingerprinting ecus to implement vehicular security for passenger safety using machine learning techniques","author":"Bellaire","journal-title":"Intelligent Systems and Applications"},{"key":"ref6","first-page":"911","article-title":"Fingerprinting electronic control units for vehicle intrusion detection","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Cho"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OCIT56763.2022.00081"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379782"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3327026"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/su14095211"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2024.1392119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4271\/11-02-02-0005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4271\/2020-01-0721"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109455"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3584944"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902993"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-014-1479-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2304139"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISS1.2017.8389463"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158055"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s24051482"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT62805.2024.10877015"},{"key":"ref26","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proceedings of the 44th annual design automation conference","author":"Edward Suh"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon51012.2023.10115118"},{"key":"ref28","article-title":"Introduction to hardware security and trust","author":"Tehranipoor","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535282"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3412933"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS52051.2020.9340160"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"Chania, Crete, Greece","start":{"date-parts":[[2025,8,4]]},"end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130113.pdf?arnumber=11130113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:20:19Z","timestamp":1756318819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130113","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}