{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:05:48Z","timestamp":1769555148431,"version":"3.49.0"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-16-C-7624"],"award-info":[{"award-number":["FA8650-16-C-7624"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Signal Process. Mag."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/msp.2018.2888893","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T19:57:58Z","timestamp":1551211078000},"page":"49-58","source":"Crossref","is-referenced-by-count":7,"title":["A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1592-3345","authenticated-orcid":false,"given":"Ronald A.","family":"Riley","sequence":"first","affiliation":[]},{"given":"James T.","family":"Graham","sequence":"additional","affiliation":[]},{"given":"Ryan M.","family":"Fuller","sequence":"additional","affiliation":[]},{"given":"Rusty O.","family":"Baldwin","sequence":"additional","affiliation":[]},{"given":"Ashwin","family":"Fisher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1063008.1","article-title":"Block-level algorithm classification based on RF side-channel","author":"graham","year":"0","journal-title":"Proceedings of SPIE Defense and Commercial Sensing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.205"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17499-5_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1117\/12.2304468"},{"key":"ref14","year":"2017","journal-title":"EM Probe Station A security test tool for embedded devices & smartcards"},{"key":"ref15","year":"2017","journal-title":"Products Oscilloscopes SDA 813Zi-B"},{"key":"ref16","first-page":"1018507.1","article-title":"Characterization of Riscure 1-GHz low sensitivity probe for side channel analysis","author":"graham","year":"0","journal-title":"Proceedings of SPIE Defense and Commercial Sensing"},{"key":"ref17","author":"de mulder","year":"2010","journal-title":"Electromagnetic Techniques and Probes for Side-Channel Analysis on Cryptographic Devices"},{"key":"ref18","first-page":"594","article-title":"Practical electro-magnetic analysis","author":"de beer","year":"0","journal-title":"Non-Invasive Attack Testing Workshop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1117\/12.2304461"},{"key":"ref4","first-page":"33","article-title":"Introduction of random forest classifier to ZigBee device network authentication using RF-DNA fingerprinting","volume":"13","author":"patel","year":"2014","journal-title":"J Information Warfare"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2372432"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487224"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2287600"},{"key":"ref8","author":"tung","year":"2017","journal-title":"IoT Devices Will Outnumber the World&#x2019;s Population This Year for the First Time"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783762"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2015.02.001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"ref9","first-page":"1","article-title":"Watch me, but don&#x2019;t touch me! Contactless control flow monitoring via electromagnetic emanations","author":"han","year":"0","journal-title":"Proc ACM SIGSAC Conf Computer and Communications Security"}],"container-title":["IEEE Signal Processing Magazine"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/79\/8653511\/8653534-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/79\/8653511\/08653534.pdf?arnumber=8653534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:44:56Z","timestamp":1657745096000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8653534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":19,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msp.2018.2888893","relation":{},"ISSN":["1053-5888","1558-0792"],"issn-type":[{"value":"1053-5888","type":"print"},{"value":"1558-0792","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}