{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:14:45Z","timestamp":1725714885584},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1109\/isse49799.2020.9272246","type":"proceedings-article","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T02:37:42Z","timestamp":1607135862000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices"],"prefix":"10.1109","author":[{"given":"Abdurhman","family":"Albasir","sequence":"first","affiliation":[]},{"given":"Kshirasagar","family":"Naik","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Manzano","sequence":"additional","affiliation":[]},{"given":"Parth","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Nitin","family":"Naik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2015.7352512"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.91"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.04.035"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297430"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302364"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"journal-title":"Composable distributed-state models for high-dimensional time series","year":"2009","author":"taylor","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6849-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2005.01.012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33018-6_28"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199486"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315262"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref8","article-title":"Detection of anomalous behavior in wireless devices using change-point analysis","author":"manzano","year":"0","journal-title":"2019 IEEE International Congress on Internet of Things (ICIOT)"},{"journal-title":"Leveraging uncertainty for effective malware mitigation","year":"2018","author":"sun","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2017.7960568"},{"journal-title":"Newzoo's 2018 global mobile market report Insights into the world's 3 billion smartphone users","year":"2018","author":"kooistra","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2019.00030"},{"journal-title":"Efficient penalty search for multiple changepoint problems","year":"2014","author":"haynes","key":"ref20"},{"journal-title":"Time-Frequency Signal Analysis and Processing Second Edition A Comprehensive Reference","year":"2016","author":"boashash","key":"ref22"},{"journal-title":"Deep learning for time series classification A review","year":"2018","author":"fawaz","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1121\/1.400476"}],"event":{"name":"2020 IEEE International Symposium on Systems Engineering (ISSE)","start":{"date-parts":[[2020,10,12]]},"location":"Vienna, Austria","end":{"date-parts":[[2020,11,12]]}},"container-title":["2020 IEEE International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9272011\/9272012\/09272246.pdf?arnumber=9272246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:28Z","timestamp":1656453088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9272246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isse49799.2020.9272246","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]}}}