{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:46:36Z","timestamp":1730220396245,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/etfa45728.2021.9613634","type":"proceedings-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:13:36Z","timestamp":1638317616000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Watermarking Based Sensor Attack Detection in Home Automation Systems"],"prefix":"10.1109","author":[{"given":"Henri","family":"Ruotsalainen","sequence":"first","affiliation":[{"name":"Institute of IT Security Research St. P&#x00F6;lten University of Applied Sciences,St. P&#x00F6;lten,Austria"}]},{"given":"Albert","family":"Treytl","sequence":"additional","affiliation":[{"name":"Danube University Krems,Dept. for Integrated Sensorsystems,Wr. Neustadt,Austria"}]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"Danube University Krems,Dept. for Integrated Sensorsystems,Wr. Neustadt,Austria"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963800"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431569"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2570812"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s110404118"},{"key":"ref16","first-page":"1367","article-title":"Side-channel watermarking for lo-rawan using robust inter-packet timing","volume":"1","author":"bigler","year":"0","journal-title":"2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196556"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"ref4","article-title":"Light commands: Laser-based audio injection attacks on voice-controllable systems","author":"sugawara","year":"0","journal-title":"29th USENIX Security Symposium (USENIX Security 20)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2015.2463089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103904"},{"key":"ref2","article-title":"This ain't your dose: Sensor spoofing attack on medical infusion pump","author":"park","year":"2016","journal-title":"10th USENIX Workshop on Offensive Technologies (WOOT 16)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2475298"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.20"},{"journal-title":"STM32L0 Discovery kit LoRa Sigfox low-power wireless ST Microsys-terns","year":"2021","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527494"}],"event":{"name":"2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2021,9,7]]},"location":"Vasteras, Sweden","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9613137\/9613141\/09613634.pdf?arnumber=9613634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:33:23Z","timestamp":1667511203000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/etfa45728.2021.9613634","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}