{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:38:59Z","timestamp":1730227139861,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072972","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"96-101","source":"Crossref","is-referenced-by-count":1,"title":["A Critical Analysis on the Security Attacks and Relevant Countermeasures using ML"],"prefix":"10.1109","author":[{"given":"Pragati","family":"Upadhya","sequence":"first","affiliation":[{"name":"PSIT College of Higher Education,Kanpur,Uttar Pradesh"}]},{"given":"J","family":"Sangeethapriya.","sequence":"additional","affiliation":[{"name":"Saranathan College of Engineering Venkateswara Nagar, Trichy &#x2013; Madurai Hwy,Department of Information Technology,Panjappur,Tamil Nadu"}]},{"given":"Ajay","family":"Kumar","sequence":"additional","affiliation":[{"name":"Bharati Vidyapeeth (Deemed to be University) Institute of Management and Research,New Delhi"}]},{"given":"R. B.","family":"Dhumale","sequence":"additional","affiliation":[{"name":"AISSMS Institute of Information Technology,Pune,Maharashtra,India"}]},{"given":"Rajesh","family":"Singh","sequence":"additional","affiliation":[{"name":"Uttaranchal Institute of Technology, Uttaranchal University,Dehradun,Uttarakhand,India"}]},{"given":"Vikas","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of CSE,Dehradun,Uttarakhand,India"}]}],"member":"263","reference":[{"key":"ref1","first-page":"265","article-title":"AnUpdatedSurveyonSecureECCImpleme ntations:Attacks,CountermeasuresandCost","volume":"6805","author":"Fan","year":"2012","journal-title":"Cryptogra-phy and Security: From Theory to Applications"},{"key":"ref2","first-page":"67","article-title":"Comparative Study of Elliptic Curve Cryptography HardwareImplementationsinWirelessSensorNetworks","volume":"1","author":"Houssain","year":"2012","journal-title":"Int.J.RFI DSecur.Cryptogr"},{"issue":"3","key":"ref3","article-title":"AReviewofTechniquesforImple mentingEllipticCurve PointMultiplicationon Hardware","volume":"10","author":"VerriLucca","year":"2021","journal-title":"J.Sens.ActuatorNetw"},{"volume-title":"GuidetoEllipticCurveC ryptography","year":"2003","author":"Hankerson","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.02.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513110"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44318-8_3"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","article-title":"TemplateAttacks","volume":"2523","author":"Chari","year":"2003","journal-title":"Lect. NotesComput. Sci."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-319-21476-4_2","article-title":"Templateattacksvs. Machinelearningrevisited(andthecurseofdimensionalityinside-channelanalysis)","volume":"9064","author":"Lerman","year":"2015","journal-title":"Lect.NotesComput.Sci"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140247"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app9010064"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1063\/5.0074225"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1063\/5.0074211"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.11.121"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1918379"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2021.117016"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072972.pdf?arnumber=10072972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T06:47:52Z","timestamp":1709448472000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072972\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072972","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}