{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:50:34Z","timestamp":1740181834980,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/ojcs.2021.3061445","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T20:47:15Z","timestamp":1614113235000},"page":"139-151","source":"Crossref","is-referenced-by-count":4,"title":["A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6751-3287","authenticated-orcid":false,"given":"Michael","family":"Lescisin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0472-5757","authenticated-orcid":false,"given":"Qusay H.","family":"Mahmoud","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Tools for active and passive network side-channel detection for web applications","author":"lescisin","year":"0","journal-title":"Proc 12th USENIX Workshop Offensive Technol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9595081"},{"key":"ref12","article-title":"Timing analysis of keystrokes and timing attacks on Ssh","volume":"10","author":"song","year":"0","journal-title":"Proc 10th Conf USENIX Secur Symp"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866374"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046737"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196510"},{"key":"ref16","first-page":"224","article-title":"Automated side-channel analysis of android apis","author":"spreitzer","year":"0","journal-title":"Proc 11th ACM Conf Secur Privacy Wireless Mobile Netw ser WiSec &#x2019;18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23155"},{"key":"ref18","article-title":"Bayes&#x2019; theorem","author":"triola","year":"0","journal-title":"Elementary Statistics"},{"key":"ref19","first-page":"76","article-title":"Docker: Lightweight linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux J"},{"key":"ref28","article-title":"Side-channel assessment of open source hardware wallets","volume":"2019","author":"pedro","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2779824"},{"article-title":"Sidechannel-detection-framework","year":"2019","author":"lescisin","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606555"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01770-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978397"},{"key":"ref8","first-page":"719","article-title":"Flush reload: A high resolution, low noise, l3 cache side-channel attack","author":"yarom","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.47"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00074"},{"article-title":"Sqlmap - under the hood","year":"2013","author":"stampar","key":"ref1"},{"article-title":"Introduction to data compression","year":"2013","author":"blelloch","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2792745.2792762"},{"key":"ref22","article-title":"Bochs: A portable pc emulator for unix\/x","volume":"1996","author":"lawton","year":"1996","journal-title":"&#x201D; Linux J"},{"key":"ref21","article-title":"Packet generation and network based attacks with scapy","author":"biondi","year":"2005","journal-title":"CanSecWest"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2011.37"},{"key":"ref23","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"year":"2018","key":"ref26","article-title":"Wikipedia Main Page"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.55"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782664\/9349230\/09361206.pdf?arnumber=9361206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T20:33:03Z","timestamp":1641587583000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9361206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2021.3061445","relation":{},"ISSN":["2644-1268"],"issn-type":[{"type":"electronic","value":"2644-1268"}],"subject":[],"published":{"date-parts":[[2021]]}}}