{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:14:33Z","timestamp":1755800073602,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,1]]},"DOI":"10.1109\/metroind4.0iot66048.2025.11122057","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:08:07Z","timestamp":1755626887000},"page":"123-128","source":"Crossref","is-referenced-by-count":0,"title":["Side-Channel Measurements and Machine Learning for Classifying Application-Level Scenarios in IoT Contexts"],"prefix":"10.1109","author":[{"given":"Vincenzo","family":"Rega","sequence":"first","affiliation":[{"name":"DIEI University of Cassino and Southern Lazio-UNICAS,Department of Electrical and Information Engineering,Cassino,Italy"}]},{"given":"Luca","family":"Tari","sequence":"additional","affiliation":[{"name":"DIEI University of Cassino and Southern Lazio-UNICAS,Department of Electrical and Information Engineering,Cassino,Italy"}]},{"given":"Domenico","family":"Capriglione","sequence":"additional","affiliation":[{"name":"DIEI University of Cassino and Southern Lazio-UNICAS,Department of Electrical and Information Engineering,Cassino,Italy"}]},{"given":"Mario","family":"Molinara","sequence":"additional","affiliation":[{"name":"DIEI University of Cassino and Southern Lazio-UNICAS,Department of Electrical and Information Engineering,Cassino,Italy"}]},{"given":"Fabrizio","family":"Marignetti","sequence":"additional","affiliation":[{"name":"DIEI University of Cassino and Southern Lazio-UNICAS,Department of Electrical and Information Engineering,Cassino,Italy"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s41635-021-00112-6","article-title":"Whispering devices: A survey on how side-channels lead to compromised information","volume":"5","author":"Lavaud","year":"2021","journal-title":"Journal Hardware and Systems Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JTEHM.2020.3028996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3501334"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MetroInd4.0IoT57462.2023.10180188"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13081579"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.diin.2019.03.002","article-title":"A survey of electromagnetic side-channel attacks and discussion on their caseprogressing potential for digital forensics","volume":"29","author":"Sayakkara","year":"2019","journal-title":"Digital Investigation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3362670"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE50685.2021.9427585"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3282662"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2014.062722"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i3.148-179"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3491916"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC60896.2024.10561040"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966373"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012487302797"},{"key":"ref19","first-page":"603","article-title":"Random delay inserted instruction: a countermeasure against timing side-channel attack","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security (AsiaCCS)","author":"Zhou"}],"event":{"name":"2025 IEEE International Workshop on Metrology for Industry 4.0 &amp; IoT (MetroInd4.0 &amp; IoT)","start":{"date-parts":[[2025,7,1]]},"location":"Castelldefels, Spain","end":{"date-parts":[[2025,7,3]]}},"container-title":["2025 IEEE International Workshop on Metrology for Industry 4.0 &amp;amp; IoT (MetroInd4.0 &amp;amp; IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11122018\/11121940\/11122057.pdf?arnumber=11122057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T07:01:33Z","timestamp":1755673293000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11122057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/metroind4.0iot66048.2025.11122057","relation":{},"subject":[],"published":{"date-parts":[[2025,7,1]]}}}