{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:47:44Z","timestamp":1730224064075,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8648131","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T23:34:06Z","timestamp":1550792046000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems"],"prefix":"10.1109","author":[{"given":"An","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaoshan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuyan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"143","article-title":"Effective attacks and provable defenses for website fingerprinting","author":"wang","year":"2014","journal-title":"23th USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660358"},{"key":"ref12","first-page":"405","article-title":"Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users","author":"murmuria","year":"2015","journal-title":"Recent Advances in Intrusion Detection RAID 98"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2012.05.001"},{"key":"ref15","article-title":"Wattsupdoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices","author":"clark","year":"2013","journal-title":"2013 USENIX Workshop on Health Information Technologies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978323"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref3","first-page":"401","article-title":"SRID: state relation based intrusion detection for false data injection attacks in SCADA","author":"wang","year":"2014","journal-title":"Computer Security - ESORICS 2014 &#x2013; 19th European Symposium on Research in Computer Security Wroclaw Poland September 7-11 2014 Proceedings Part II"},{"key":"ref6","first-page":"97","article-title":"Side channel cryptanalysis of product ciphers","author":"kelsey","year":"1998","journal-title":"European symposium on research in computer security"},{"key":"ref5","article-title":"Survey and new directions for physics-based attack detection in control systems","author":"jairo","year":"2016","journal-title":"Tech Rep"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/978-3-540-30574-3_24","article-title":"Side-channel leakage of masked cmos gates","volume":"3376","author":"mangard","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099234"},{"journal-title":"The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration","year":"2002","author":"foster","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/11502760_28","article-title":"A side-channel analysis resistant description of the aes s-box","volume":"3557","author":"oswald","year":"2005","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08648131.pdf?arnumber=8648131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:55:24Z","timestamp":1643266524000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8648131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8648131","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}