{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:04:24Z","timestamp":1766268264105,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T00:00:00Z","timestamp":1701216000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,29]]},"DOI":"10.1109\/itnac59571.2023.10368481","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:30:40Z","timestamp":1703878240000},"page":"80-83","source":"Crossref","is-referenced-by-count":7,"title":["Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks"],"prefix":"10.1109","author":[{"given":"Amjed Abbas","family":"Ahmed","sequence":"first","affiliation":[{"name":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"}]},{"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"}]},{"given":"Nazmus Shaker","family":"Nafi","sequence":"additional","affiliation":[{"name":"GS-APAC, Kellogg Brown and Root,Melbourne,Australia"}]},{"given":"Azana Hafizah","family":"Aman","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia (UKM),Center for Cyber Security, Faculty of Information Science and Technology,Bangi,Malaysia,43600"}]},{"given":"Shayla","family":"Islam","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Digital Innovation, UCSI University,Kuala Lumpur,Malaysia,56000"}]},{"given":"Mohammad Siab","family":"Nahi","sequence":"additional","affiliation":[{"name":"Imam Al-Kadhum College (IKC),Department of Computer Techniques Engineering,Baghdad,Iraq,10011"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103383"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00212-8"},{"key":"ref3","article-title":"Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications","volume":"63.1 s","author":"Taher","year":"2020","journal-title":"Solid State Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2020.3033495"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT51715.2021.9509662"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5755\/j02.eie.33995"},{"key":"ref7","first-page":"103540","article-title":"Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations","author":"Kamrul","year":"2022","journal-title":"Journal of Network and Computer Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.107-131"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/iccr56254.2022.9995780"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tensymp55890.2023.10223652"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2022.06.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3140446"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02030-x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/host55118.2023.10133495"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app11156790"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL49045.2020.00-29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/isqed51717.2021.9424254"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/dtis53253.2021.9505075"}],"event":{"name":"2023 33rd International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2023,11,29]]},"location":"Melbourne, Australia","end":{"date-parts":[[2023,12,1]]}},"container-title":["2023 33rd International Telecommunication Networks and Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10368315\/10368472\/10368481.pdf?arnumber=10368481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:56:39Z","timestamp":1705107399000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10368481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,29]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/itnac59571.2023.10368481","relation":{},"subject":[],"published":{"date-parts":[[2023,11,29]]}}}