{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:04:01Z","timestamp":1756771441025,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/isse46696.2019.8984518","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T01:28:37Z","timestamp":1581038917000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints"],"prefix":"10.1109","author":[{"given":"Mustafa","family":"Al-tekreeti","sequence":"first","affiliation":[{"name":"University of Waterloo,Electrical &amp; Computer Engineering"}]},{"given":"Tania","family":"Kapoor","sequence":"additional","affiliation":[{"name":"University of Waterloo,Electrical &amp; Computer Engineering"}]},{"given":"Ricardo","family":"Manzano","sequence":"additional","affiliation":[{"name":"University of Waterloo,Electrical &amp; Computer Engineering"}]},{"given":"Abdurhman","family":"Albasir","sequence":"additional","affiliation":[{"name":"University of Waterloo,Electrical &amp; Computer Engineering"}]},{"given":"Kshirasagar","family":"Naik","sequence":"additional","affiliation":[{"name":"University of Waterloo,Electrical &amp; Computer Engineering"}]},{"given":"Nishith","family":"Goel","sequence":"additional","affiliation":[{"name":"Cistech Limited,Ottawa,ON,Canada"}]},{"given":"A.J.","family":"Kozlowski","sequence":"additional","affiliation":[{"name":"Cistech Limited,Ottawa,ON,Canada"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3194452.3194465"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378627"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2510825"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878982"},{"key":"ref14","first-page":"1","article-title":"Detecting crypto-ransomware in iot networks based on energy consumption footprint","author":"azmoodeh","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"journal-title":"Spectral Analysis of Signals","year":"2005","author":"stoica","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cels.2017.10.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2013.0048"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"journal-title":"Algorithms for clustering data","year":"1988","author":"jain","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334305"},{"key":"ref3","article-title":"IEEE standard classification for software anomalies","volume":"1044","author":"board","year":"1993","journal-title":"IEEE Std"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.22619\/IJCSA.2016.1001010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.10.007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FIIW.2012.6378346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2018.00144"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3265863.3265867"},{"journal-title":"Pattern Classification","year":"2012","author":"duda","key":"ref20"},{"journal-title":"Highly comparative time-series analysis code repository","year":"0","author":"fulcher","key":"ref22"},{"journal-title":"Data Mining Introductory and Advanced Topics","year":"2003","author":"dunham","key":"ref21"}],"event":{"name":"2019 International Symposium on Systems Engineering (ISSE)","start":{"date-parts":[[2019,10,1]]},"location":"Edinburgh, UK","end":{"date-parts":[[2019,10,3]]}},"container-title":["2019 International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966755\/8984263\/08984518.pdf?arnumber=8984518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:24:07Z","timestamp":1756754647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8984518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isse46696.2019.8984518","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}